{"id":418485,"date":"2024-10-20T06:21:14","date_gmt":"2024-10-20T06:21:14","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-23-30447023-dc-2023\/"},"modified":"2024-10-26T11:51:44","modified_gmt":"2024-10-26T11:51:44","slug":"bsi-23-30447023-dc-2023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-23-30447023-dc-2023\/","title":{"rendered":"BSI 23\/30447023 DC 2023"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\n30447023-NC.pdf <\/td>\n<\/tr>\n
3<\/td>\nISO_IEC DIS 9594-12 ed.1 – id.84119 Enquiry PDF (en).pdf <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
2.1 Identical Recommendations | International Standards
2.2 Recommendations
2.3 Others <\/td>\n<\/tr>\n
10<\/td>\n3 Definitions
3.1 OSI reference model security architecture definitions
3.2 Baseline identity management terms and definitions
3.3 Terms defined in public-key and attribute certificate frameworks <\/td>\n<\/tr>\n
11<\/td>\n3.4 Key management and public-key infrastructure establishment and maintenance definitions <\/td>\n<\/tr>\n
12<\/td>\n4 Abbreviations <\/td>\n<\/tr>\n
14<\/td>\n5 Conventions
6 Cyber security consideration for communication networks
6.1 The challenge of large ICT networks <\/td>\n<\/tr>\n
15<\/td>\n6.2 Connection-mode communication
6.2.1 General <\/td>\n<\/tr>\n
16<\/td>\n6.2.2 Association establishment phase
6.2.3 Data transfer phase <\/td>\n<\/tr>\n
17<\/td>\n6.2.4 Association termination phase
6.3 Symmetric key requirements <\/td>\n<\/tr>\n
18<\/td>\n7 Introduction to cryptographic algorithms <\/td>\n<\/tr>\n
19<\/td>\n8 Hash algorithms
8.1 General <\/td>\n<\/tr>\n
20<\/td>\n8.2 The SHA-2 series of hash algorithms
8.2.1 Referenced specifications
8.2.2 The SHA-2 model <\/td>\n<\/tr>\n
21<\/td>\n8.2.3 The SHA-2 characteristics
8.2.4 SHA-2 formal specification <\/td>\n<\/tr>\n
22<\/td>\n8.3 The K\u1d07\u1d04\u1d04\u1d00\u1d0b algorithms <\/td>\n<\/tr>\n
24<\/td>\n8.4 SHA-3 characteristics <\/td>\n<\/tr>\n
25<\/td>\n8.5 SHA-3 formal specifications
8.5.1 SHA3-224 specification
8.5.2 SHA3-256 specification
8.5.3 SHA3-256 specification
8.5.4 SHA3-512 specification
8.5.5 SHAKE-128 and SHAKE-256 specifications
8.5.6 SHAKE-128-len and SHAKE-256-len specifications
9 Public-key algorithms and digital signature algorithms
9.1 General <\/td>\n<\/tr>\n
27<\/td>\n9.2 The RSA public-key algorithm
9.2.1 General
9.2.2 Key generation <\/td>\n<\/tr>\n
28<\/td>\n9.2.3 Security considerations
9.2.4 RSA asynchronous encryption\/decryption
9.2.5 Signature generation and verification <\/td>\n<\/tr>\n
29<\/td>\n9.3 The DSA public-key algorithm
9.4 The elliptic curve digital signature algorithm (ECDSA)
9.4.1 General <\/td>\n<\/tr>\n
30<\/td>\n9.4.2 Defines curves
9.4.3 Key generation
9.4.4 Security considerations <\/td>\n<\/tr>\n
31<\/td>\n9.4.5 Signature generation and verification
9.5 Edwards-curve digital signature algorithm
9.5.1 General
9.5.2 Defined digital signature algorithms <\/td>\n<\/tr>\n
32<\/td>\n9.5.3 Key generation
9.5.4 Security issues
9.5.5 Signature generation and verification
10 Key establishment algorithms
10.1 Introduction <\/td>\n<\/tr>\n
33<\/td>\n10.2 Key transport
10.2.1 RSA key transport
10.3 Key agreement
10.3.1 The Diffie-Hellman key agreement method <\/td>\n<\/tr>\n
35<\/td>\n10.4 Key derivation functions
10.4.1 General
10.4.2 HMAC-based extract-and-expand key derivation function <\/td>\n<\/tr>\n
36<\/td>\n11 Symmetric-key algorithms
11.1 Stream ciphers vs. block ciphers
11.2 Advanced encryption standard
11.2.1 General <\/td>\n<\/tr>\n
38<\/td>\n11.2.2 The octet substitution layer <\/td>\n<\/tr>\n
39<\/td>\n11.2.3 The Shift Rows layer <\/td>\n<\/tr>\n
40<\/td>\n11.2.4 The mix columns layer
11.2.5 The add round key layer
11.3 Modes of advance encryption standard
11.3.1 Overview of AES modes <\/td>\n<\/tr>\n
41<\/td>\n11.3.2 Advanced encryption standard \u2013 electronic codebook (AES-ECB) mode
11.3.3 Advanced encryption standard – cipher block chaining (AES-CBC) <\/td>\n<\/tr>\n
42<\/td>\n11.3.4 Cipher feedback mode
11.3.5 Output feedback mode
11.3.6 Counter mode <\/td>\n<\/tr>\n
43<\/td>\n12 Authenticated encryption with associated data (AEAD) algorithms
12.1 General
12.2 Advanced encryption standard \u2013 Galois\/counter mode (AES-GCM)
12.3 Advanced encryption standard (AES)- Counter with CBC-MAC (CCM) <\/td>\n<\/tr>\n
44<\/td>\n13 Integrity check value (ICV) algorithms
13.1 Introduction
13.2 Keyed-hash message authentication code (HMAC) <\/td>\n<\/tr>\n
45<\/td>\n13.3 Cipher-based message authentication code (CMAC)
13.4 K\u1d07\u1d04\u1d04\u1d00\u1d0b message authentication code (KMAC)
13.4.1 General <\/td>\n<\/tr>\n
46<\/td>\n13.4.2 Input message constructions
13.4.3 KMAC formal specifications <\/td>\n<\/tr>\n
47<\/td>\n13.5 Advance encryption standard (AES) – Galois message authentication code (GMAC) algorithm
14 Security strength <\/td>\n<\/tr>\n
48<\/td>\n15 Random number generation and entropy
16 Post-quantum considerations <\/td>\n<\/tr>\n
49<\/td>\n17 Hardware security modules <\/td>\n<\/tr>\n
50<\/td>\n18 Introduction to the section
19 Public-key certificates
19.1 Content of a basic public-key certificate
19.1.1 Structure
19.1.2 Distinguished name considerations <\/td>\n<\/tr>\n
51<\/td>\n19.1.3 Version component
19.1.4 Serial number component
19.1.5 Signature component <\/td>\n<\/tr>\n
52<\/td>\n19.1.6 Issuer component
19.1.7 Validity component
19.1.8 Subject component
19.1.9 Subject public\u2011key information
19.1.10 Issuer unique ID and subject unique ID <\/td>\n<\/tr>\n
53<\/td>\n19.2 Extensions
19.2.1 Use of extensions for public-key certificates
19.2.2 Basic constraints extension
19.2.3 Key usage extension
19.2.4 Subject directory attribute extension type <\/td>\n<\/tr>\n
54<\/td>\n19.2.5 Subject alternative name extension
19.2.6 Authority information access extension
20 Trust establishment
20.1 General <\/td>\n<\/tr>\n
55<\/td>\n20.2 Single public-key infrastructure domain <\/td>\n<\/tr>\n
56<\/td>\n20.3 Trust establishment between two public-key infrastructure domains
20.4 A worldwide federated public-key infrastructure. <\/td>\n<\/tr>\n
57<\/td>\n20.5 Trust anchor compromise
21 Identity verification in a machine-to-machine environment
21.1 General
21.2 The two-PKIs approach <\/td>\n<\/tr>\n
58<\/td>\n21.3 Use of the shared secret approach
21.4 Operational PKI establishment
22 PKI configurations
22.1 Introduction <\/td>\n<\/tr>\n
59<\/td>\n22.2 PKI components
23 Certification path processing
23.1 Certification path <\/td>\n<\/tr>\n
60<\/td>\n23.2 Name chaining
23.3 Key identifier chaining <\/td>\n<\/tr>\n
61<\/td>\n24 Certification path validation
24.1 Overview <\/td>\n<\/tr>\n
62<\/td>\n24.2 Validating certification path <\/td>\n<\/tr>\n
63<\/td>\n24.3 Validating individual public-key certificates <\/td>\n<\/tr>\n
65<\/td>\nAnnex\u20acA Size of Public-key certificates <\/td>\n<\/tr>\n
69<\/td>\nAnnex\u20acB Basic mathematic concepts for cryptographic algorithms <\/td>\n<\/tr>\n
85<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS EN ISO\/IEC 9594-12. Information technology. Open systems interconnection – Part 12. The Directory. Public key infrastructure establishment and maintenance<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2023<\/td>\n86<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":418494,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[675,2641],"product_tag":[],"class_list":{"0":"post-418485","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-100-70","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/418485","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/418494"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=418485"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=418485"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=418485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}