BH GSO ISO/IEC 10736:2016
ISO/IEC 10736:1995
Bahraini Standard
Current Edition
·
Approved on
08 February 2016
Information technology -- Telecommunications and information exchange between systems -- Transport layer security protocol
BH GSO ISO/IEC 10736:2016 Files
English
50 Pages
Current Edition
Reference Language
Obtaining this standard through the store is currently unavailable. You can acquire it directly from its source.
BH GSO ISO/IEC 10736:2016 Scope
The procedures specified in this Recommendation | International Standard operate as extensions to those defined in ITU-T Rec. X.224 | ISO/IEC 8073 and ITU-T Rec. X.234 | ISO/IEC 8602 and do not preclude unprotected communication between transport entities implementing ITU-T Rec. X.224 | ISO/IEC 8073 or ITU-T Rec. X.234 | ISO 8602.
The protection achieved by the security protocol defined in this Recommendation | International Standard depends on the proper operation of security management including key management. However, this Recommendation | International Standard does not specify the management functions and protocols needed to support this security protocol.
This protocol can support all the integrity, confidentiality, authentication and access control services identified in CCITT Rec. X.800 I ISO 7498-2 as relevant to the transport layer. The protocol supports these services through use of cryptographic mechanisms, security labelling and attributes, such as keys and authenticated identities, pre-established by security management or established through the use of the Security Association — Protocol (SA-P).
Protection can be provided only within the context of a security policy.
This protocol supports peer-entity authentication at the time of connection establishment. In addition, rekeying is supported within the protocol through the use of SA-P or through means outside the protocol.
Security associations can only be established within the context of a security policy. It is a matter for the users to establish their own security policy, which may be constrained by the procedures specified in this Recommendation | International Standard.
The following items could be included in a Security Policy:
a) the method of SA establishment/release, the lifetime of SA;
b) Authentication/Access Control mechanisms;
c) Label mechanism;
d) the procedure of the receiving an invalid TPDU during SA establishment procedure or transmission of protected PDU;
e) the lifetime of Key;
f) the interval of the rekey procedure in order to update key and security control information (SCI) exchange procedure;
g) the time out of SCI exchange and rekey procedure;
h) the number of retries of sci exchange and rekey procedure.
this Recommendation | International Standard defines a protocol which may be used for Security Association establishment. Entities wishing to establish an SA must share common mechanisms for authentication and key distribution. this Recommendation | International Standard specifies one algorithm for authentication and key distribution which is based on public key crypto systems. The implementation of this algorithm is not mandatory; however, when an alternative mechanism is used, it shall satisfy the following conditions:
a) All SA attributes defined in 5.2 are derived.
b) Derived keys are authenticated.
Best Sellers From Information Sector
GSO ISO/TR 18492:2017
ISO/TR 18492:2005
Gulf Standard
Long-term preservation of electronic document-based information


GSO ISO/TS 23635:2024
ISO/TS 23635:2022
Gulf Standard
Blockchain and distributed ledger technologies — Guidelines for governance


BH GSO ISO/IEC 15773:2016
ISO/IEC 15773:1998
Bahraini Standard
Information technology -- Telecommunications and information exchange between systems -- Broadband Private Integrated Services Network -- Inter-exchange signalling protocol -- Transit counter additional network feature




GSO ISO/IEC 15773:2013
ISO/IEC 15773:1998
Gulf Standard
Information technology -- Telecommunications and information exchange between systems -- Broadband Private Integrated Services Network -- Inter-exchange signalling protocol -- Transit counter additional network feature



Recently Published from Information Sector
GSO ISO/IEC 10373-1:2025
ISO/IEC 10373-1:2020
Gulf Standard
Cards and security devices for personal identification — Test methods — Part 1: General characteristics



GSO ISO/IEC 30179:2025
ISO/IEC 30179:2023
Gulf Standard
Internet of Things (IoT) — Overview and general requirements of IoT system for ecological environment monitoring



GSO ISO/IEC 18033-7:2025
ISO/IEC 18033-7:2022
Gulf Standard
Information security — Encryption algorithms — Part 7: Tweakable block ciphers



GSO ISO/IEC TS 20000-5:2025
ISO/IEC TS 20000-5:2022
Gulf Standard
Information technology — Service management — Part 5: Implementation guidance for ISO/IEC 20000-1


