home *** CD-ROM | disk | FTP | other *** search
Text File | 1993-07-15 | 47.6 KB | 1,279 lines |
- ANNEX A
- (to Recommendation X.32)
- Actions taken by the DCE in the roles of questioning
- and challenged parties for security grade 1
- and security grade 2 identifications
- A.1 Introduction
- This annex specifies the actions taken by the DCE when it acts as the
- questioning and challenged parties for security grade 1 and security grade 2
- identifications. When performing the identification procedure described in S
- 7.1.2, the DCE shall act as described in this annex.
- Note - As the identification protocol is symmetrical and should be used by
- the DTE in the same manner as the DCE, the actions of the DTE should correspond
- directly to the actions defined for the DCE.
- The identification protocol is presented as a succession of state diagrams
- and corresponding tables.
- In this annex, a DIAG element is considered as positive when its parameter
- field means identification/authentication confirmed, request for dial-back
- confirmed, or dial-back indicator (see S 7.3.3.5). It is considered as negative
- in other cases.
- A.1.1 Symbol definition of state diagrams
- FIGURE T0706570-88
-
- A.1.2 Definition of actions
- In each table, the actions taken by the DCE as the questioning party or
- the challenged party are indicated in the following way:
- NORMAL: Normal event; protocol elements received are handled as
- described in S 7.1.2.
- DISCARD: Received message is discarded.
- RAND: RAND transmitted.
- Positive DIAG: Positive DIAG transmitted.
- Negative DIAG: Negative DIAG transmitted.
- ID [, SIG]: ID [, SIG] transmittted.
- SRES: SRES transmitted.
- Each entry in the tables in this annex gives, first, the action taken, if
- any, then an arrow indicating the transition, and finally, the state that the DCE
- as the questioning or challenged party will enter.
- A.2 Security grade 1 identification
- A.2.1 DCE acting as the questioning party
- The DCE acts as the questioning party for security grade 1 when it offers
- identified or customized DTE service via the XID or registration DTE
- identification method with grade 1 authentication. Four states are defined for
- describing the procedures the DCE uses:
- a) q11 - Waiting for ID [, SIG] (grade 1)
- This is the initial state of the DTE identification process. It is
- entered after the switched connection is established and, when the
- registration procedure DTE identification method is used, after the
- link layer is set up. In this state, the DCE expects to receive the ID
- (and possibly SIG) element(s) from the DTE. If the DCE allows retrying
- the identification protocol, this state is also entered when a DTE
- identification attempt has failed and the limit of retries has not been
- exhausted.
- b) q12 - Evaluating ID [, SIG] (grade 1)
- In this state, the DCE determines whether or not the DTE identity that
- was presented in the ID (and possibly SIG) element(s) is acceptable.
- The result is the transmission by the DCE to the DTE of the DIAG
- element, which has as its value the success or not of the acceptability
- evaluation.
- c) q13 - DTE identification successful (grade 1)
- In this state, the DCE provides the identified or customized DTE
- service to the identified DTE. The DCE remains in this state until the
- switched connection is disconnected.
- d) q14 - DTE identification unsuccessful (grade 1)
- In this state, the DCE does not provide the identified or customized
- DTE service (unless NUI is used on a per virtual call basis for the
- Identified DTE service) but may provide the Nonidentified DTE service
-
-
-
-
- Fascicle VIII.2 - Rec. X.32 PAGE1
-
- if it is supported. The DCE enters this state when the last DTE
- identification attempt allowed by the retry limit has failed. The DCE
- remains in this state until the switched connection is disconnected.
- Figure A-1/X.32 provides the state diagram for the DCE acting as the
- questioning party in the case of security grade 1 identification.
- The actions to be taken by the DCE acting as the questioning party for
- security grade 1 identification, when one of the listed events occurs, are
- indicated in Table A-1/X.32.
- FIGURE A-1/X.32 T0706580-88
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PAGE1 Fascicle VIII.2 - Rec. X.32
-
- TABLE A-1/X.32
- Actions taken by the DCE as the questioning party (security grade 1)
- State of the DCE acting q11 q12 q13 q14 DTE
- as the questioning party Waiting for Evaluating Identification identification
- Protocol element received ID [, SIG] ID [, SIG] successful unsuccessful
- by the DCE or decision by (grade 1) (grade 1) (grade 1) (grade 1) (see
- the DCE Note 1)
- ID [, SIG] NORMAL ->q12 DISCARD ->q12 DISCARD ->q13 DISCARD ->q14
- DCE checking of the ID [, Positive DIAG ///////////////
- SIG] is complete /////////////// ->q13 or /////////////// /
- / negative DIAG / ///////////////
- /////////////// ->q14 or ->q11 /////////////// /
- / (see Note 2) / ///////////////
- /////////////// /////////////// /
- / / ///////////////
- /////////////// /////////////// /
- / / ///////////////
- /////////////// /////////////// /
- / / ///////////////
- /////////////// /////////////// /
- / /
- Note 1 - When in this state, the DCE should disconnect the switched access path when it
- is sure that the DIAG element has been received by the challenged party or the challenged
- party is out-of-order.
- Note 2 - Depending on whether or not ID and/or SIG are recognized as correct by the DCE.
- When negative DIAG, go to q11 until the retry limit has been reached.
- A.2.2 DCE acting as the challenged party
- The DCE acts as the challenged party for security grade 1 when it
- identifies itself to the DTE via the XID or registration DCE identification
- method with grade 1 authentication. Four states are defined for describing the
- procedures the DCE uses:
- a) c11 - Initial challenged (grade 1)
- This is the initial state of the DCE identification process. It is
- entered after the switched connection is established, and, when the
- registration procedure DCE identification method is used, after the
- link layer is set up. In this state, the DCE transmits the ID (and
- possibly SIG) element(s) to the DTE.
- b) c12 - Waiting for DIAG (grade 1)
- In this state, the DCE expects to receive the DIAG element which has as
- its value the acceptability or not of the DCE identity.
- c) c13 - DCE Identification successful (grade 1)
- In this state, the DCE has completed its identification successfully.
- The DCE remains in this state until the switched connection is
- disconnected.
- d) c14 - DCE Identification unsuccessful (grade 1)
- The DCE enters this state when the DCE identification attempt has
- failed. The DCE remains in this state until the switched connection is
- disconnected.
- Figure A-2/X.32 provides the state diagram for the DCE acting as the
- challenged party in the case of security grade 1 identification.
- The actions to be taken by the DCE as the challenged party for security
- grade 1 identification, when one of the listed events occurs, are indicated in
- Table A-2/X.32.
- FIGURE A-2/X.32 T0706590-88
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Fascicle VIII.2 - Rec. X.32 PAGE1
-
-
- TABLE A-2/X.32
- Actions taken by the DCE as the challenged party (security grade 1)
- State of the DCE acting c11 c12 c13 c14
- as the challenged party Initial Waiting for Identification identification
- challenged DIAG
- Protocol element received (grade 1) (grade 1) successful unsuccessful
- by the DCE or decision by (grade 1) (grade 1) (see
- the DCE Note 1)
- DCE decides it wants to be ID [, SIG] - /////////////////////////////////////////////
- identified >c12 / / /
- /////////////////////////////////////////////
- / / /
- Positive DIAG NORMAL ->c13 NORMAL ->c13 DISCARD ->q13 DISCARD ->q14
- or c14
- (see Note 2)
- Negative DIAG NORMAL ->c14 NORMAL ->c14 DISCARD ->q13 DISCARD ->q14
- Note 1 - In this state, the DCE shall disconnect the switched access path.
- Note 2 - c13 or c14 depending on whether or not the DCE wants to be identified.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PAGE1 Fascicle VIII.2 - Rec. X.32
-
- A.3 Security grade 2 identification
- A.3.1 DCE acting as the questioning party
- The DCE acts as the questioning party for security grade 2 when it offers
- identified or customized DTE service via the XID or registration DTE
- identification method with grade 2 authentication. Six states are defined for
- describing the procedures the DCE uses:
- a) q21 - Waiting for ID [, SIG] (grade 2)
- This is the initial state of the DTE identification process. It is
- entered after the switched connection is established and, when the
- registration procedure DTE identification method is used, after the
- link layer is set up. In this state, the DCE expects to receive the ID
- (and possibly SIG) element(s) from the DTE.
- b) q22 - Evaluating ID [, SIG] (grade 2)
- In this state, the DCE begins determining whether or not the DTE
- identity that was presented in the ID (and possibly SIG) element(s) is
- acceptable. If the DTE identity is acceptable or the acceptability is
- not fully determined in this state, the DCE generates the value for the
- RAND element and transmits it to the DTE. If the DTE identity is
- unacceptable, the DCE transmits to the DTE the DIAG element with a
- negative value.
- c) q23 - Waiting for SRES
- In this state, the DCE expects to receive the SRES element from the
- DTE. The DCE may continue to evaluate the ID (and possibly SIG)
- element(s) and, if the DTE identity is unacceptable, the DCE transmits
- to the DTE the DIAG element with a negative value.
- d) q24 - Evaluating SRES
- In this state, the DCE determines if the value presented in the SRES
- element is correct for the DTE identity. If the evaluation of the ID [,
- SIG] element(s) has not already been completed, it is completed in this
- state. The results of the SRES check (and the last of the ID [, SIG]
- check) is transmitted by the DCE to the DTE as the value of the DIAG
- element.
- e) q25 - DTE identification successful (grade 2)
- In this state, the DCE provides the identified or customized DTE
- service to the identified DTE. The DCE remains in this state until the
- switched connection is disconnected.
- f) q26 - DTE identification unsuccessful (grade 2)
- In this state, the DCE does not provide the identified or customized
- DTE service (unless NUI is used on a per virtual call basis for the
- identified DTE service) but may provide the nonidentified DTE service
- if it is supported. The DCE remains in this state until the switched
- connection is disconnected.
- Figure A-3/X.32 provides a state diagram for the DCE acting as the
- questioning party in case of security grade 2 identification.
- The actions to be taken by the DCE as the questioning party for security
- grade 2 identification, when one of the listed events occurs, are indicated in
- Table A-3/X.32.
- A.3.2 DCE acting as the challenged party
- The DCE acts as the challenged party for security grade 2 when it
- identifies itself to the DTE via the XID or registration DCE identification
- method with grade 2 authentication. Six states are defined for describing the
- procedures the DCE uses:
- a) c21 - Initial challenged (grade 2)
- This is the initial state of the DCE identification process. It is
- entered after the switched connection is established, and, when the
- registration procedure DCE identification method is used, after the
- link layer is set up. In this state, the DCE transmits the ID (and
- possibly SIG) element(s) to the DTE.
- b) c22 - Waiting for RAND
- In this state, the DCE expects to receive the RAND element. If the ID
- (and possible SIG) are not acceptable to the DTE, the DCE may receive
- the DIAG element with a negative value.
- c) c23 - Calculating SRES
- Using the value of the RAND element, the DCE calculates the value for
- the SRES element and transmits it to the DTE. If the DTE has continued
-
-
-
-
- Fascicle VIII.2 - Rec. X.32 PAGE1
-
- to evaluate the ID (and possibly SIG) and determined that it is not
- acceptable, the DCE may receive the DIAG element with a negative value.
- d) c24 - Waiting for DIAG (grade 2)
- In this state, the DCE expects to receive the DIAG element which has as
- its value the acceptability or not of the DCE identity and SRES value.
- e) c25 - DCE identification successful (grade 2)
- In this state, the DCE has completed its identification successfully.
- The DCE remains in this state until the switched connection is
- disconnected.
- f) c26 - DCE identification unsuccessful (grade 2)
- The DCE enters this state when the DCE identification attempt has
- failed. The DCE remains in this state until the switched connection is
- disconnected.
- FIGURE A-3/X.32 T0706600-88
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PAGE1 Fascicle VIII.2 - Rec. X.32
-
- TABLE A-3/X.32
- Actions taken by the DCE as the questioning party (security grade 2)
- State of the
- DCE acting as the q21 q22 q23
- questioning party Waiting Evaluating Waiting q24 q25 q26
- forID [, ID [, SIG] for SRES Evaluating DTE DTE
- SIG] (grade 2) SRES identificaidentifica
- (grade 2) tion tion
- Protocol element received successful unsuccessf
- by the DCE or decision by (grade 2) ul (grade
- the DCE 2) (see
- Note 1)
- ID [, SIG] NORMAL - DISCARD - DISCARD - DISCARD - DISCARD - DISCARD -
- >q22 >q22 >q23 >q24 >q25 >q26
- At least initial DCE RAND - //////////
- checking of the ID [, SIG] ////////// >q23 or ////////////////////////////// ///
- is complete /// Negative /// /// /// //////////
- //////////DIAG ->q26 ////////////////////////////// ///
- /// (see Note /// /// /// //////////
- ////////// 2) ////////////////////////////// ///
- /// /// /// /// //////////
- ////////// ////////////////////////////// ///
- /// /// /// /// //////////
- ////////// ////////////////////////////// ///
- /// /// /// /// //////////
- ////////// ////////////////////////////// ///
- /// /// /// ///
- Further DCE checking (if NORMAL -
- any) of the ID [, SIG] is ////////////////////
- complete /// ///
- ////////////////////
- /// ///
- ////////////////////
- /// ///
- ////////////////////
- /// ///
- ////////////////////
- /// ///
- ////////////////////
- /// ///
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Fascicle VIII.2 - Rec. X.32 PAGE1
-
- >q23 or //////////////////////////////
- Negative /// /// ///
- DIAG - //////////////////////////////
- >q26 (see /// /// ///
- Note 3) //////////////////////////////
- /// /// ///
- //////////////////////////////
- /// /// ///
- //////////////////////////////
- /// /// ///
- //////////////////////////////
- /// /// ///
- SRES Negative Negative NORMAL - DISCARD - DISCARD - DISCARD -
- DIAG->q26 DIAG->q26 >q24 >q24 >q25 >q26
- DCE checking of the SRES Positive
- is complete ////////////////////////////// DIAG - ////////////////////
- /// /// /// >q25 or /// ///
- ////////////////////////////// Negative ////////////////////
- /// /// /// DIAG - /// ///
- //////////////////////////////>q26 (see ////////////////////
- /// /// /// Note 4) /// ///
- ////////////////////////////// ////////////////////
- /// /// /// /// ///
- ////////////////////////////// ////////////////////
- /// /// /// /// ///
- ////////////////////////////// ////////////////////
- /// /// /// /// ///
- Note 1 - When in this state, the DCE should disconnect the switched access path when it
- is sure that the DIAG element has been received by the challenged party, or the challenged
- party is out-of-order.
- Note 2 - As negative DIAG is sent if the DCE has detected ID [, SIG] as incorrect. RAND is
- sent if the DCE has detected ID [, SIG] as correct or if it has not yet checked ID [,
- SIG].
- Note 3 - After having transmitted RAND, if the DCE detects that the ID [, SIG] received
- when in state q21 was incorrect, it transmits a negative DIAG and goes into state q26.
- Otherwise, the DCE continues with the normal process of waiting to receive the SRES
- element.
- Note 4 - q25 ou q26 depending on whether or not the SRES is recognized as correct by the
- DCE.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PAGE1 Fascicle VIII.2 - Rec. X.32
-
- Figure A-4/X.32 provides a state diagram for the DCE acting as the
- challenging party in case of security grade 2 identification.
- The actions to be taken by the DCE for security grade 2 identification,
- when one of the listed events occurs, are indicated in Table A-4/X.32.
- FIGURE A-4/X.32 T-0706610-88
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Fascicle VIII.2 - Rec. X.32 PAGE1
-
- TABLE A-4/X.32
- Actions taken by the DCE as the challenged party (security grade 2)
- State of the
- DCE acting as the c21 c24
- challenged party Initial c22 c23 Waiting c25 c26
- challenged Waiting Calculatin for DIAG DCE DCE
- (grade 2) for RAND g SRES (grade 2) identificaidentifica
- tion tion
- Protocol element received successful unsuccessf
- by the DCE or decision by (grade 2) ul (grade
- the DCE 2) (see
- Note 1)
- DCE decides it wants to ID [,
- be identified SIG] ->c22//////////////////////////////////////////////////
- /// /// /// /// ///
- //////////////////////////////////////////////////
- /// /// /// /// ///
- RAND DISCARD - NORMAL - DISCARD - DISCARD - DISCARD - DISCARD -
- >c26 >c23 >c23 >c24 >c25 >c26
- DCE calculation of SRES ////////// SRES -
- from RAND is complete ////////// ///
- /// //////////
- ////////// ///
- /// //////////
- ////////// ///
- ///
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PAGE1 Fascicle VIII.2 - Rec. X.32
-
- >c24 //////////////////////////////
- /// /// ///
- //////////////////////////////
- /// /// ///
- //////////////////////////////
- /// /// ///
- Positive DIAG DISCARD NORMAL DISCARD NORMAL DISCARD DISCARD
- ->c26 ->c25 or ->c26 ->c25 ->c25 ->c26
- c26 (see
- Note 2)
- Negative DIAG DISCARD NORMAL NORMAL NORMAL DISCARD DISCARD
- ->c26 ->c26 ->c26 ->c26 ->c25 ->c26
- Note 1 - In this state, the DCE shall disconnect the switched access path.
- Note 2 - c25 or c26 depending on whether or not the DCE wants to be identified.
- ANNEX B
- (to Recommendation X.32)
- Abbreviations
- ADM Asynchronous disconnected mode
- AVAIL-BAS Available on all networks
- AVAIL-NS Available and selected by the network
- AVAIL-OPT Available on some networks
- AVAIL-RQ Available on some networks and must be requested
- BA Class of HDLC
- CSPDN Circuit switched public data network
- CUSTOM Customized
- DCE Data circuit-terminating equipment
- DIAG Diagnostic element
- DISC Disconnect
- DM Disconnected mode
- DNIC Data network identification code
- DSE Data switching equipment
- DTE Data terminal equipment
- FI Format identifier
- HDLC High-level data link control
- HDTM Half-duplex transmission module
- ID Identity element
- ISDN Integrated services digital network
- ISO International organization for standardization
- k Number of outstanding I frames
- LAPB Link access procedure B
- LAPX Link access procedure - Half-duplex
- MT... Parameter...
- N... Parameter...
- ND Network default
- NN National number
- NTN Network terminal number
- NUI Network user identification
- PDN Public data network
- PSN Public switched network
- PSPDN Packet switched public data network
- PSTN Public switched telephone network
- RAND Random number element
- REJ Reject
- RPOA Recognized private operating agency
- RR Receive ready
- RSA Rivest, Shamir, Adleman algorithm
- SABM Set asynchronous balanced mode
- SABME Set asynchronous balanced mode extended
- SIG Signature element
- SRES Signed response element
- TCC Telephone country code
- T... Timer...
- UA Unnumbered acknowledge
- UTC Coordinated universal time
- XC Counter...e
-
-
-
-
- Fascicle VIII.2 - Rec. X.32 PAGE1
-
- XID Exchange identification (Unnumbered Format)
- XT... Timer...
- APPENDIX I
- (to Recommendation X.32)
- Implementation of LAPX
- I.1 Introduction
- Considerations are given here for defining the signals needed between the
- HDTM and the LAPB and physical layer modules in implementing LAPX.
- I.2 Control and status functions
- The following logical functions describe interactions between LAPB and the
- HDTM:
- - control [TERM]
- LAPB has entered the disconnected phase.
- - control [CONCLUDE]
- LAPB has finished transmitting one or more frames.
- - status [OP-T]
- Enable LAPB to send frames.
- - status [INOP-T]
- Inhibit LAPB from sending frames.
- If the idle channel state condition detection mechanism of LAPB is not
- disabled, then the HDTM needs to protect LAPB from the use of idle channel state
- condition in turning around the line. This protection is done by having the HDTM
- present constant flags to LAPB except in the Half-duplex receiving state (state
- 3). It may be desirable to define additional logical functions in doing this.
- The following logical functions describe interactions between the HDTM and
- the physical layer:
- - control [SEIZE]
- The HDTM has stopped waiting for data to be received and is waiting to
- transmit data.
- - control [RELEASE]
- The HDTM has stopped sending data and is requesting the physical layer
- to release the right to transmit.
- - control [DISCON]
- The HDTM is requesting the physical layer to disconnect the physical
- connection because LAPB is disconnected.
- - status [CALLING]
- The physical connection originated by this DTE/DCE is established.
- - status [CALLED]
- The physical connection originated by the other DTE/DCE is established.
- - status [UNCON]
- There is no physical connection.
- - status [XMT]
- The physical connection is able to transmit data.
- - status [REMOTE]
- This is an optional function used if the physical layer, instead of the
- HDTM, detects the indication that the remote DTE/DCE accepts the right
- to transmit (remote is in the Half-duplex sending state).
- - status [LOCAL]
- This is an optional function used if the physical layer, instead of the
- HDTM, detects the request for change in the direction of transmission
- that gives the local DTE/DCE the right to transmit (remote is in the
- Wait or receiving state).
- The forms of these interactions are not defined. However, an example of
- the HDTM physical layer interactions is given in SS 5.6.7 and 5.6.8.
- I.3 Table of transitions between states
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PAGE1 Fascicle VIII.2 - Rec. X.32
-
- Table I-1/X.32 shows the events that cause a state transition and the
- resulting action(s). This provides a generalized description of operation of the
- HDTM.
- TABLE I-1/X.32
- Description of state transitions
- Present state Transition name New state
- Event Action
- 0 Initialize calling DTE/DCE 4
- Idle state Calling DTE/DCE: data Do function control Wait for sending
- circuit established [SEIZE] state
- (e.g. data set ready,
- ready for data) (i.e.
- status [CALLING])
- 0 Initialize called DTE/DCE 2
- Idle state Called DTE/DCE: data Start timer XT1 Wait for receiving
- circuit established state
- (e.g. data set ready,
- ready for data) (i.e.
- status [CALLED])
- 1 Send right to transmit 2
- Half-duplex Conclusion of Send request that Wait for receiving
- sending state transmission (i.e. remote DTE/DCE enter state
- control [CONCLUDE]) the half-duplex
- sending state (see
- Note 1). Start timer
- TX1. Do function
- status [INOP-T] (see
- Note 2). Do function
- control [RELEASE]
- 1 Disconnect sending DTE/DCE 0
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Fascicle VIII.2 - Rec. X.32 PAGE1
-
- Half-duplex LAPB has entered a Do function control Idle state
- sending state disconnected phase [DISCON]
- (i.e. control [TERM])
- (see Note 3)
- 2 Receive confirmation 3
- Wait for receiving Reception of Stop timer XT1 Half-duplex
- state indication that the receiving state
- remote DTC/DCE has
- entered the
- half-duplex sending
- state (see Note 4)
- (i.e. status
- [REMOTE])
- 2 Seize right to transmit 4
- Wait for receiving Expiry of timer XT1 Do function control Wait for sending
- state or has frame to send [SEIZE] state
- (i.e. a LAPB/HDTM
- transmit data
- function) (see Note
- 5)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PAGE1 Fascicle VIII.2 - Rec. X.32
-
- TABLE I-1/X.32 (continued)
- Description of state transitions
- Present state Transition name New state
- Event Action
- 3 Initialize calling DTE/DCE 4
- Half-duplex Reception of Do function control Wait for sending
- receiving state notification that the [SEIZE] state
- remote DTE/DCE is
- requesting a change
- in the direction of
- transmission (i.e.
- status [LOCAL]) (see
- Note 6)
- 3 Receive right to transmit 2
- Half-duplex Reception of Start timer XT1 Wait for receiving
- receiving state notification that the state
- remote DTE/DCE is re-
- questing a change in
- the direc-tion of
- transmission (i.e.
- status [LOCAL]) (see
- Note 6)
- 3 Disconnect receiving DTE/DCE 0
- Half-duplex LAPB has entered a Do function control Idle state
- sending state disconnected phase [DISCON]
- (i.e. control [TERM])
- (see Note 3)
- 4 Send confirmation 1
- Half-duplex
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Fascicle VIII.2 - Rec. X.32 PAGE1
-
- sending state Indication of Send indication to Half-duplex sending
- availability of the the remote DTE/DCE state
- physical layer for that the half-duplex
- trans-mission (i.e. sending state has
- status [XMT]) been entered. Do
- function status
- [OP-T] (see Note 7)
- Any Reset from any state 0
- Physical layer has Do function status Idle state
- no circuit to a [INOP-T]
- remote DTE/DCE (i.e.
- status [UNCON])
- Note 1 - HDTM uses the idle data link channel state indication (at least 15 continuous
- 1's) for requesting that the remote DTE enter the half-duplex sending state.
- Note 2 - Status [INOP-T] indicates to LAPB that the sending of frames is inhibited.
- Note 3 - Control [TERM] indicates that LAPB has entered the disconnected phase (equivalent
- to ADM of HDLC).
- Note 4 - Reception of a flag or detection of carrier ON (circuit109 = 1) is this
- indication.
- Note 5 - One timer XT1 expiration must occur before a frame may be sent.
- Note 6 - HDTM uses the idle data link channel state indication (at least 15 continuous
- 1's) or detection of carrier OFF (CIRCUIT 109 = 0) for detecting that the remote DTE is
- requesting a change in the direction of transmission.
- Note 7 - Status [OP-T] indicates to LAPB that the sending of frame is enabled.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PAGE1 Fascicle VIII.2 - Rec. X.32
-
- I.4 HDTM/physical layer control and status functions expressed in terms
- applicable to a modem interface
- Continuing the example of S 5.6.7, the HDTM/physical layer logical
- functions may be described as shown below as they apply to the use of the HDTM
- with a V-series modem interface:
- - control [SEIZE]
- Request turning circuit 105 ON and, if necessary, releasing circuit 103
- from binary 1 condition.
- - control [RELEASE]
- Request holding circuit 103 in the binary 1 condition and turning
- circuit 105 OFF.
- - control [DISCON]
- Request turning circuit 107 OFF and, if necessary, turning circuit 105
- OFF.
- - status [CALLING]
- As the calling DTE/DCE, report circuit 107 ON.
- - status [CALLED]
- As the called DTE/DCE, report circuit 107 ON.
- - status [UNCON]
- Report circuit 107 OFF.
- - status [XMT]
- Report circuit 106 ON.
- - status [REMOTE]
- Report carrier ON.
- - status [LOCAL]
- Report carrier OFF.
- APPENDIX II
- (to Recommendation X.32)
- RSA public key algorithm
- The Rivest, Shamir, Adleman (RSA) algorithm defines a public key
- cryptography system. Each subscriber to an RSA cryptosystem generates a public
- modulo key (n), a public exponential key (e), and a secret exponential key (d)
- which conform to certain consistency rules to be subsequently described. The
- subscriber can publish and disclose its public keys (n, e) but it will never
- reveal its secret exponential key (d). The exchange of information via the RSA
- algorithm involves the successive transformations and decryption. The form of
- encryption and decryption transformations are mathematically identical but differ
- only in the values of the exponential keys used. Each RSA transformation is of
- the form:
- X` = Xk (modulo n)
- where
- X is the integer to be transformed
- X` is the transformed integer
- n is the public modulo key
- k is the exponential key which is either the public exponential key e, or
- the secret exponential key d.
- The RSA keys for a subscriber are generated subject to the following two
- constraints:
- n = p . q (p and q are large prime numbers)
- (d . e) modulo [(p - 1) . (q - 1)] = 1
- The encryption operation can use either e or d as the exponential key.
- However, the decryption operation must use the exponential key (d or e) that was
- not used in the encryption process. Both processes must use the same modulo key,
- n.
- As applied to the security grade 2 identification process described in S
- 7.1.2, the challenged party will generate SRES by encrypting RAND using its
- secret exponential key, d, so that the questioning party can decrypt SRES using
- the public keys of the challenged party (e and n).
- APPENDIX III
- (to Recommendation X.32)
- Relationship of timer T14 to the different
- methods of DTE identification
- Figure III-1/X.32 illustrates the points in the general sequence of events
- defined in this Recommendation at which timer T14 is started or stopped.
- FIGURE III-1/X.32 T0706620-88
-
-
-
-
- Fascicle VIII.2 - Rec. X.32 PAGE1
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PAGE1 Fascicle VIII.2 - Rec. X.32
-
-