Standard

IEEE 1609.2-2022

Aktuell
Vorschau Vorschau ist nicht verfügbar

Bestehende oder zukünftige Amendments und Versionen müssen separat erworben werden.

Sprache
Format

Zusammenfassung

Revision Standard - Active. Secure message formats and processing for use by Wireless Access in Vehicular Environments (WAVE) devices are defined in this standard, including methods to secure WAVE management messages and methods to secure application messages. Administrative functions necessary to support the core security functions are also described.

Produktspezifikationen

  • Standard von IEEE
  • Ausgabedatum:
  • Dokumenttyp: IS
  • Seiten
  • Herausgeber: IEEE
  • Lieferant: IEEE
  • ICS: 35.240.60
  • Nationales Komitee: IEEE Vehicular Technology Society / Intelligent Transportation Systems

Produktbeziehungen

  • referenziert von: IEEE 1609.2.1-2022/Cor 1-2023
  • referenziert: IEEE 1609.12-2019
  • referenziert: IEEE 1609.0-2019
  • Revidiert: IEEE 1609.2-2016
  • referenziert: IEEE 1363a-2004
  • referenziert: IEEE 1363-2000
  • referenziert: NIST SP 800-38C, Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality.12
  • referenziert: ANSI and FIPS Codes: United States Census, 2010 FIPS Codes for Counties and County Equivalent Entities.
  • referenziert: SAC GB/T 32918.5-2017, Information Security Technology—Public Key Cryptographic Algorithm SM2 Based On Elliptic Curves--Part 5: Parameter Definition, July 2018.
  • referenziert: NIMA TR8350.2, Department of Defense World Geodetic System 1984, Its Definition and Relationships with Local Geodetic Systems., Jan. 2000.11
  • referenziert: ISO/IEC 14888-3:2018, IT Security technique-Digital signatures with appendix--Part 3: Discrete logarithm based mechanisms
  • referenziert: ITU-T Recommendation X.680, Information Technology—Abstract Syntax Notation One (ASN.1) & ASN.1 Encoding Rules.10
  • referenziert: IETF Request for Comments: 3629, UTF-8, A Transformation Format of ISO 10646.
  • referenziert: FIPS 180-4, Secure Hash Standard (SHS), Aug. 2015.
  • referenziert: FIPS 186-4, Digital Signature Standard (DSS), July 2013.
  • referenziert: SECG, “SEC 1: Elliptic Curve Cryptography”, Version 2.0, May 21, 2009.14
  • referenziert: ITU-T Recommendation X.696, Information Technology—ASN.1 Encoding Rules: Specification of Octet Encoding Rules (OER).
  • referenziert: IETF Request for Comments: 5639, Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation.
  • referenziert: United Nations Statistics Division, “Composition of Macro Geographical (Continental) Regions, Geographical Sub-Regions, and Selected Economic and Other Groupings” [referred to as “UN Region Codes”], revision of 31 Oct. 2013.
  • referenziert: ISO/IEC 10118-3:2018: IT Security techniques—Hash-functions—Part 3: Dedicated hash-functions SM4: ISO/IEC 18033-3:2010/AMD 1:2021 Information technology—Security techniques—Encryption algorithms—Part 3: Block ciphers—Amendment 1: SM4.
  • referenziert: FIPS 197, Advanced Encryption Standard (AES), Nov. 2001.
  • referenziert: IETF RFC 4648, The Base16, Base32, and Base64 Data Encodings.
  • referenziert: SECG, “SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV)”, Version 1.0, Jan. 24, 2013.
  • referenziert: IETF Request for Comments: 3610, Counter with CBC-MAC (CCM).8
  • referenziert: SAC GB/T 32918.4-2016, Information Security Technology—Public Key Cryptographic Algorithm SM2 Based On Elliptic Curves--Part 4: Public Key Encryption Algorithm, July 2018.13