{"id":418485,"date":"2024-10-20T06:21:14","date_gmt":"2024-10-20T06:21:14","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-23-30447023-dc-2023\/"},"modified":"2024-10-26T11:51:44","modified_gmt":"2024-10-26T11:51:44","slug":"bsi-23-30447023-dc-2023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-23-30447023-dc-2023\/","title":{"rendered":"BSI 23\/30447023 DC 2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | 30447023-NC.pdf <\/td>\n<\/tr>\n | ||||||
3<\/td>\n | ISO_IEC DIS 9594-12 ed.1 – id.84119 Enquiry PDF (en).pdf <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 2.1 Identical Recommendations | International Standards 2.2 Recommendations 2.3 Others <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 3 Definitions 3.1 OSI reference model security architecture definitions 3.2 Baseline identity management terms and definitions 3.3 Terms defined in public-key and attribute certificate frameworks <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 3.4 Key management and public-key infrastructure establishment and maintenance definitions <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4 Abbreviations <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5 Conventions 6 Cyber security consideration for communication networks 6.1 The challenge of large ICT networks <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6.2 Connection-mode communication 6.2.1 General <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.2.2 Association establishment phase 6.2.3 Data transfer phase <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.2.4 Association termination phase 6.3 Symmetric key requirements <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7 Introduction to cryptographic algorithms <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 8 Hash algorithms 8.1 General <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 8.2 The SHA-2 series of hash algorithms 8.2.1 Referenced specifications 8.2.2 The SHA-2 model <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 8.2.3 The SHA-2 characteristics 8.2.4 SHA-2 formal specification <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 8.3 The K\u1d07\u1d04\u1d04\u1d00\u1d0b algorithms <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 8.4 SHA-3 characteristics <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 8.5 SHA-3 formal specifications 8.5.1 SHA3-224 specification 8.5.2 SHA3-256 specification 8.5.3 SHA3-256 specification 8.5.4 SHA3-512 specification 8.5.5 SHAKE-128 and SHAKE-256 specifications 8.5.6 SHAKE-128-len and SHAKE-256-len specifications 9 Public-key algorithms and digital signature algorithms 9.1 General <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 9.2 The RSA public-key algorithm 9.2.1 General 9.2.2 Key generation <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 9.2.3 Security considerations 9.2.4 RSA asynchronous encryption\/decryption 9.2.5 Signature generation and verification <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 9.3 The DSA public-key algorithm 9.4 The elliptic curve digital signature algorithm (ECDSA) 9.4.1 General <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 9.4.2 Defines curves 9.4.3 Key generation 9.4.4 Security considerations <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 9.4.5 Signature generation and verification 9.5 Edwards-curve digital signature algorithm 9.5.1 General 9.5.2 Defined digital signature algorithms <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 9.5.3 Key generation 9.5.4 Security issues 9.5.5 Signature generation and verification 10 Key establishment algorithms 10.1 Introduction <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 10.2 Key transport 10.2.1 RSA key transport 10.3 Key agreement 10.3.1 The Diffie-Hellman key agreement method <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 10.4 Key derivation functions 10.4.1 General 10.4.2 HMAC-based extract-and-expand key derivation function <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 11 Symmetric-key algorithms 11.1 Stream ciphers vs. block ciphers 11.2 Advanced encryption standard 11.2.1 General <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 11.2.2 The octet substitution layer <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 11.2.3 The Shift Rows layer <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 11.2.4 The mix columns layer 11.2.5 The add round key layer 11.3 Modes of advance encryption standard 11.3.1 Overview of AES modes <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 11.3.2 Advanced encryption standard \u2013 electronic codebook (AES-ECB) mode 11.3.3 Advanced encryption standard – cipher block chaining (AES-CBC) <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 11.3.4 Cipher feedback mode 11.3.5 Output feedback mode 11.3.6 Counter mode <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 12 Authenticated encryption with associated data (AEAD) algorithms 12.1 General 12.2 Advanced encryption standard \u2013 Galois\/counter mode (AES-GCM) 12.3 Advanced encryption standard (AES)- Counter with CBC-MAC (CCM) <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 13 Integrity check value (ICV) algorithms 13.1 Introduction 13.2 Keyed-hash message authentication code (HMAC) <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 13.3 Cipher-based message authentication code (CMAC) 13.4 K\u1d07\u1d04\u1d04\u1d00\u1d0b message authentication code (KMAC) 13.4.1 General <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 13.4.2 Input message constructions 13.4.3 KMAC formal specifications <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 13.5 Advance encryption standard (AES) – Galois message authentication code (GMAC) algorithm 14 Security strength <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 15 Random number generation and entropy 16 Post-quantum considerations <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 17 Hardware security modules <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 18 Introduction to the section 19 Public-key certificates 19.1 Content of a basic public-key certificate 19.1.1 Structure 19.1.2 Distinguished name considerations <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 19.1.3 Version component 19.1.4 Serial number component 19.1.5 Signature component <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 19.1.6 Issuer component 19.1.7 Validity component 19.1.8 Subject component 19.1.9 Subject public\u2011key information 19.1.10 Issuer unique ID and subject unique ID <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 19.2 Extensions 19.2.1 Use of extensions for public-key certificates 19.2.2 Basic constraints extension 19.2.3 Key usage extension 19.2.4 Subject directory attribute extension type <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 19.2.5 Subject alternative name extension 19.2.6 Authority information access extension 20 Trust establishment 20.1 General <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 20.2 Single public-key infrastructure domain <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 20.3 Trust establishment between two public-key infrastructure domains 20.4 A worldwide federated public-key infrastructure. <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 20.5 Trust anchor compromise 21 Identity verification in a machine-to-machine environment 21.1 General 21.2 The two-PKIs approach <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 21.3 Use of the shared secret approach 21.4 Operational PKI establishment 22 PKI configurations 22.1 Introduction <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 22.2 PKI components 23 Certification path processing 23.1 Certification path <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | 23.2 Name chaining 23.3 Key identifier chaining <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 24 Certification path validation 24.1 Overview <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 24.2 Validating certification path <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 24.3 Validating individual public-key certificates <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | Annex\u20acA Size of Public-key certificates <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | Annex\u20acB Basic mathematic concepts for cryptographic algorithms <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS EN ISO\/IEC 9594-12. Information technology. Open systems interconnection – Part 12. The Directory. Public key infrastructure establishment and maintenance<\/b><\/p>\n |