Minutes - Security Industry Association
Minutes - Security Industry Association
Minutes - Security Industry Association
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
2 Error Handling<br />
Handling for a wrong CRC (checksum) or time stamp are specifically covered in<br />
the existing document. Incorrect decryption would cause a checksum failure.<br />
The DUH message is intended as a catchall for messages that are<br />
"unprocessable" for other reasons, so it would be difficult to further define this.<br />
1 Check Criterion<br />
The existing extended data definition to carry the MAC address seems sufficient.<br />
Should this field become mandatory for some implementations?<br />
2 Encrypted Size<br />
Less effort is being expended in newer designs to reduce data size, so that the<br />
data encoding is more robust and more easily debugged.<br />
3 Checklist of Main Requirements<br />
This would be an excellent annex.<br />
4 Token Table<br />
It's generally avoided to duplicate information from one standard in another<br />
document to keep the two documents from coming into later conflict. But<br />
repeating the reference table as an annex would be reasonable.<br />
1 Data Encryption<br />
The document references FIPS 197 for AES encryption. Use of encryption is<br />
certainly desirable, but this standard does not need to mandate its use.<br />
2 Hash<br />
The encryption provides enough of a signature to satisfy most message<br />
authentication requirements, but a scheme to include a specific signature could<br />
be designed and included in the standard.<br />
3 2009 Errata<br />
This information needs to be incorporated in the published document.<br />
4 Formatting<br />
The document could be reformatted to improve clarity.<br />
5 prEN 50136-1-7 Interoperability<br />
Considerable analysis would be required to comment on the feasibility of<br />
defining a translation from one protocol to the next.