IEEE Std 802.1AR-2018 pdf free download – IEEE Standard for Local and Metropolitan Area Networks— Secure Device Identity

02-25-2022 comment

IEEE Std 802.1AR-2018 pdf free download – IEEE Standard for Local and Metropolitan Area Networks— Secure Device Identity.
3. Definitions
For the purposes of this document, the following terms and definitions apply. The IEEE Standards Dictionary Online should be consulted for terms not defined in this clause. 8
3.1 aggregate device: A device containing multiple logical or physical devices.
3.2 authentication: Verification that a claimed identity is correct.
3.3 authentication exchange: The information exchange between entities performing authentication.
NOTE—Examples of authentication exchange methods are Extensible Authentication Protocol (EAP) and Simple Authentication and Security Layer (SASL).
3.4 Authenticator: An entity that facilitates authentication of other entities attached to the same LAN.
3.5 Basic Encoding Rules (BER): Rules, specified in ISO/IEC 8825-1, for encoding ASN.1 data types.
3.6 certificate: A digitally signed object that binds information identifying an entity that possesses a secret private key to the corresponding public key.
3.7 certificate chain: An ordered list of intermediate certificates (3.30) that links an end entity certificate (in this standard, a DevID certificate) to a trust anchor.
3.8 certificate revocation list (CRL): A signed list of revoked certificates.
3.9 certificate signing request (CSR): A signed message from the device to the CA requesting a certificate be issued.
3.10 certification authority (CA): An entity that issues X.509 digital certificates.
3.11 cipher suite: A set of one or more cryptographic algorithms.
3.12 client: A protocol entity that makes use of a service.
3.13 credential: Information that an entity (a person or device) possesses that allow it to make a verifiable claim of identity, i.e., to be authenticated.
NOTE—In this standard, DevIDs are credentials.
3.14 cryptographic binding: A data object constructed using cryptographic operations to combine a secret with other arbitrary data objects such that it can be proven that the resulting object could only be created by an entity having knowledge of the secret.
3.15 cryptographic key: An input parameter that varies the result of applying a cryptographic function.
3.16 customer: In this standard, the person, organization, or administrator acting on their behalf, that allows a device received from its supplier to be attached to and subsequently used in the customer’s network.
3.17 device: A device is any entity that has an IDevID (3.25).IEEE Std 802.1AR pdf download.

Download infomation Go to download
Note: If you can share this website on your Facebook,Twitter or others,I will share more.

LEAVE A REPLY

Anonymous netizen Fill in information