没有合适的资源?快使用搜索试试~ 我知道了~
JasPar 规范-Requirements Specification for Message Authentication
需积分: 0 1 下载量 167 浏览量
2024-01-19
13:39:03
上传
评论
收藏 1.39MB PDF 举报
温馨提示
试读
48页
作为消息身份验证功能的要求规范,定义了消息身份验证代码 (MAC) 过程 (MAC 生成,发送和接收,验证和验证失败时的处理) 的规范以及管理 MAC 新鲜度值的规范。
资源推荐
资源详情
资源评论
JASPAR Standards: ST-CSP-6
Copyrights for this specification belong to the General Incorporated Association JASPAR.
Unauthorized copying and reproduction is prohibited by copyright.
General Incorporated Association JASPAR
ST-CSP-6
JASPAR Requirements Specification
for Message Authentication
Ver. 2.11
Issued on December 11, 2020
Cyber Security Promotion WG
JASPAR Requirements Specification for Message Authentication Ver.2.11 ST-CSP-6
- 2 -
Unauthorized copying and reproduction is prohibited by copyright.
Revision History
Version
Changes
Changed by
1.0
Newly created
Cyber
Security
Promotion
WG
2.0
Added segment [VerifyStart] where MAC verification is not performed
for a certain time after an ECU starts
Cyber
Security
Promotion
WG
Added whether or not to increment the trip counter at IG-ON as a
variation
Changed so that the reset flag is generated from the LSB of the reset
counter
Changed so that the reset flag is included as a freshness value
Added behaviors for when the freshness value reaches the maximum
value
Added “Multi FV management master” to the system configuration
Changed so that the same procedure as discarding the message with the
authenticator is performed when the sync message verification fails
Described in Scope that the presence of vulnerabilities shall be
examined when using this specification
Changed the target for associating the freshness value from the
protected data to the message ID
Corrected errors.
- SecOcFreshnessValueSyncAttempts
→ SecOCFreshnessValueSyncAttempts
Deleted unused design values
- AuthInfoLength
- SecOCFreshnessValueLength
- AccumulativeFailCntLength
- MACKeyNumber
Changed to enable selection of whether to discard or accept the received
message when verification of the received message fails
Deleted the following variations
- Freshness value structure
- Key group
Changed the lower limit of ResetFlagLength from 1 to 0 to support
variations without reset flag
2.1
Deleted the sending start conditions for a message with the
authenticator from the requirements and added them to the variation
support
Cyber
Security
Promotion
WG
Made the following changes in padding operation for structure of
authentication data
Deleted description because adjustment of the block length is
performed during CMAC calculation
Added requirement for adjustment in byte units
Changed so that MAC verification is performed even within the
[VerifyStart] time for determining whether the freshness value
(previously received value) needs to be stored based on the verification
result
Changed to include the case when the accumulative verification fail
counter is implemented by an application
Separated the requirements on processes when retrieving of the trip
counter has failed
JASPAR Requirements Specification for Message Authentication Ver.2.11 ST-CSP-6
- 3 -
Unauthorized copying and reproduction is prohibited by copyright.
Changed so that, when retrieving of the trip counter has failed, any
failsafe value can be used in the trip counter and reset counter, and that
value shall not be stored in the non-volatile memory
Added supplemental information that, even when the trip counter
changes from the maximum value to the initial value, it is stored in the
non-volatile memory.
2.11
・Added to the appendix A
・Added to 1.10 Notes on patents and 1.11 notes on copyrights
Cyber
Security
Promotion
WG
JASPAR Requirements Specification for Message Authentication Ver.2.11 ST-CSP-6
- 4 -
Unauthorized copying and reproduction is prohibited by copyright.
Table of Contents
1. Introduction ........................................................................................................................................ 6
2. Message authentication ...................................................................................................................... 8
2.2.1. Single FV management master ................................................................................................. 9
2.2.2. Multi FV management master .................................................................................................. 9
2.2.3. Requirements for each entity .................................................................................................. 10
3. MAC Processing ................................................................................................................................ 12
3.3.1. Message authentication processing determination................................................................ 14
3.3.2. Getting message ID .................................................................................................................. 14
3.3.3. Getting MAC key ...................................................................................................................... 15
3.3.4. Getting FV ................................................................................................................................ 15
3.3.5. Construction of the authentication data ................................................................................. 15
3.3.6. MAC generation ....................................................................................................................... 15
3.3.7. Generation of the message with the authenticator ................................................................ 16
3.4.1. Message authentication processing determination................................................................ 17
3.4.2. Getting Message ID .................................................................................................................. 18
3.4.3. FV comparison .......................................................................................................................... 18
3.4.4. Getting MAC key ...................................................................................................................... 19
3.4.5. Getting freshness value for verification.................................................................................. 19
3.4.6. Construction of the authentication data ................................................................................. 19
3.4.7. Generation of the MAC for verification .................................................................................. 19
3.4.8. MAC verification ...................................................................................................................... 20
3.5.1. Re-verification .......................................................................................................................... 21
3.5.2. Notification of verification result ............................................................................................ 21
3.5.3. Message reception .................................................................................................................... 21
3.5.4. Accumulative verification fail counter .................................................................................... 22
4. Management of freshness value ........................................................................................................ 23
JASPAR Requirements Specification for Message Authentication Ver.2.11 ST-CSP-6
- 5 -
Unauthorized copying and reproduction is prohibited by copyright.
4.2.1. Freshness value structure ....................................................................................................... 23
4.2.2. Freshness value (counter) ........................................................................................................ 24
4.4.1. Startup process ......................................................................................................................... 28
4.4.2. Counter update process ........................................................................................................... 28
4.4.3. Sync message transmission ..................................................................................................... 29
4.5.1. Startup process ......................................................................................................................... 31
4.5.2. Process at reception of sync message ...................................................................................... 31
4.5.3. Freshness value construction at the transmission of the message with the authenticator 33
4.5.4. Freshness value construction at the reception of the message with the authenticator ...... 35
4.5.5. Counter update process ........................................................................................................... 42
5. Variation support .............................................................................................................................. 43
6. Design values .................................................................................................................................... 44
Appendix A ............................................................................................................................................... 47
剩余47页未读,继续阅读
资源评论
落叶成花
- 粉丝: 260
- 资源: 9
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功