Application Support Functions
Application Support Functions
ASN.1
Security
Data encryption
Nonrepudiation
Authentication
Public key certification authorities
13.2 ASN.1
Concern the representation (syntax) of data during its transfer
between two APs
Ensure the messages exchanged between two Aps have a
common meaning ---- shared semantics
13.2 ASN.1 (cont-1)
13.2.1 Type definitions
Four classes of type identifiers
UNIVERSAL: the generalized types such as integer
CONTEXT-SPECIFIC : these are related to the specific context in which
they are used
APPLICATION : these are common to a complete application
PRIVATE : these are user definable but must begin with an upper-case
letter
Constructed type :
UNIVERSAL(constructed) SEQUENCE : a fixed bounded,ordered list
of types
SEQUENCEOF : a fixed or unbounded,ordered list of elements,all of
the same type
SET : a fixed or unbounded,unordered list of elements,all of the same
type
CHOICE : a fixed, unordered list of types, selected from a previously
specified set of types
Tag:
CONTEXT-SPECIFIC : the tag has meaning only within the scope of the
present structured type
APPLICATION : the tag has meaning in the context of the complete
application (collection of types)
PRIVATE : the tag has meaning only to the user
13.2.1 Type definitions (cont-3)
13.2.2 Transfer syntax
Encoding
Identifier : defines the ASN.1 type
Length : defines the number of octets in the contents field
Contents : defines the contents (which may be other data element for a structured type)
13.2.2 Transfer syntax (cont-1)
13.2.2 Transfer syntax (cont-2)
13.2.2 Transfer syntax (cont-3)
Decoding
13.2.2 Transfer syntax (cont-4)
13.3 Security
Integrity
has not been altered in any way
Privacy/secrecy
has not been intercepted and read by anyone
Authentication
has come from an authorized sender
Nonrepudiation
has proof that the stated sender initiated the
transaction
13.4 Data encryption
13.4.1 Terminology
PlainText
Prior to encryption, message data is normally referred to as PlainText
Ciphertext
After encryption, message data referred to as ciphertext
13.4.2 Basic techniques
Plaintext alphabet: a b c d e f g
Ciphertext alphabet: b e f g h i j
Plaintext alphabet: a b c d e f g
Ciphertext alphabet: n z q a i y m
13.4.2 Basic techniques (cont-1)
For example:
Assuming a plaintext message of “this is a lovely day” , the
ciphertext is derived as follows :
1 2 3 4 --- key
t h i s
- i s -
a - l o
v e l y
- d a y
Ciphertext = t-av-hi-edisllas-oyy
13.4.2 Basic techniques (cont-2)
13.4.2 Basic techniques (cont-3)
13.4.3 The data encryption standard
13.4.3 The data encryption standard (cont-1)
CA : Certification Authority
Contents of a certificate in RFC 1422
Summary