ARINC 823P2:2008
Current
The latest, up-to-date edition.
DataLink Security, Part 2 - Key Management
Hardcopy , PDF
English
03-10-2008
1.0 INTRODUCTION
1.1 Purpose of Document
1.2 Scope
1.3 Document Overview
1.4 Related Documents
1.5 Document Precedence
1.6 Regulatory Approval
1.7 Export Control Compliance
2.0 KEY MANAGEMENT
2.1 Communications Environment
2.2 Security Application
2.3 Security Services
2.4 Key Management Alternatives
3.0 ASYMMETRIC KEY MANAGEMENT
3.1 Key Management Infrastructure
3.2 Public Key Certificate Life Cycle
3.3 Private Key Life Cycle
3.4 Compromise Management
4.0 SYMMETRIC KEY MANAGEMENT
4.1 Key Management Infrastructure
4.2 Shared Secret Key Life Cycle
4.3 Compromise Management
ATTACHMENT 1 - AMS KEY MANAGEMENT
IMPLEMENTATION CONFORMANCE
STATEMENTS (KMICS)
ATTACHMENT 2 - AMS PUBLIC KEY PROFILES
ATTACHMENT 3 - AMS PRIVATE/SECRET KEY
PROTECTION
APPENDIX A - GLOSSARY
APPENDIX B - ACRONYMS
APPENDIX C - NOTATION
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.