Table of Contents
FOREWORD
CONTENTS
1Scope
2Normativereferences
3Messagesystemandkeyexchange
3.1Messagechannel
3.2Messageformats
3.2.1Identifier
3.2.2Length
3.2.3Bitstring
3.3Startingtheprivacysystem
3.3.1Startingmessages
3.3.2Sessionkeyexchange
4ISO8732keymanagement
4.1Introduction
4.2Keymanagementarchitecture
4.3Keymanagementenvironments
4.4Cryptographicservicemessageexchanges
4.5ExampleofISO8732messageexchange
5ExtendedDiffie-Hellmankeydistribution
5.1Introduction
5.2Thebasicprotocol
5.2.1*Key*exchangemethod
5.2.2Derivationofthe*key*
5.3Diffie-Hellmanmessages
5.3.1*Key*exchangeinformation
5.3.2Intermediate*key*exchangeinformation
5.3.3CheckcodeinformationfromMCU
5.4Extensionforlinechecks
6RSAbasedoperation
6.1Introduction
6.1.1General
6.1.2Notation
6.2Systemset-up
6.3Authenticationkeygenerationanddistribution
6.4Certification
6.5AlternativesolutionforcertificationwithoutaGCA
6.6Authenticationofentities
6.6.1SimultaneoustransmissionofRSA.P1messages
6.7Generationofkeyforencryptionofsessionkeys
6.8RSAmessages
6.8.1Authenticationinitiation
6.8.2Authenticationresponse
6.8.3Authenticationcomplete
6.8.4Authenticationfailed
7MCUoperation
Bibliography Abstract
Describes three methods of encryption key management, namely: - ISO 8732; - Diffie-Hellman; and - RSA.