e) Supported algorithms Discussion Security Policy Key Updates 1 Security model The implementation of the security policy depends on the trust relationships between entities in the piconet. 1.1 Role Model One can distinguish the following roles of entities within the piconet setting: · Security Manager .
Security Suite Specifications 1.1 Security suite selections 1.1.1 OID selections Author’s note: The following entry should be added to the security suites table in clause 10.2.1.
Security Suite Specifications 1.1 Security suite selections 1.1.1 OID selections Author’s note: The following entry should be added to the security suites table in clause 10.2.1.
10.3 ECMQV security suite Editorial note: Replace the ECIES 256-prime-1 security suite, as specified in Clause 10.3 of the current Draft D10 by the ECMQV security suite specified below.
Purpose This document defines the security elements necessary to implement the mandatory and optional elliptic curve cryptography (ECC) security suite.
e) Supported algorithms Discussion Security Policy Key Updates 1 Security model The implementation of the security policy depends on the trust relationships between entities in the piconet. 1.1 Role Model One can distinguish the following roles of entities within the piconet setting: · Security Manager .