Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 5: Security rules for batch EDI (authenticity, integrity and non-repudiation of origin)

This part of ISO 9735 specifies syntax rules for EDIFACT security. It provides a method to address message/package level, group level and interchange level security for authenticity, integrity and non-repudiation of origin, in accordance with established security mechanisms.

Échange de données informatisé pour l'administration, le commerce et le transport (EDIFACT) — Règles de syntaxe au niveau de l'application (numéro de version de syntaxe: 4, numéro d'édition de syntaxe: 1) — Partie 5: Règles de sécurité pour EDI par lots (authenticité, intégrité et non-répudiation de l'origine)

Elektronska menjava podatkov (-računalniška-) v administraciji (upravi), trgovini in transportu (prevozništvu) EDIFACT - Pravila sintakse za uporabniški nivo (izvedbena oblika sintakse: 4, zaporedna št. izdaje 1) Peti del: varnostna pravila za šaržno EDI (elektronsko menjavanje podatkov).

General Information

Status
Published
Publication Date
03-Jul-2002
Current Stage
9093 - International Standard confirmed
Start Date
05-Sep-2024
Completion Date
13-Dec-2025

Relations

Standard
ISO 9735-5:2002 - Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 5: Security rules for batch EDI (authenticity, integrity and non-repudiation of origin) Released:7/4/2002
English language
38 pages
sale 15% off
Preview
sale 15% off
Preview
Draft
ISO 9735-5:2004
English language
38 pages
sale 10% off
sale 10% off
e-Library read for
1 day

Standards Content (Sample)


INTERNATIONAL ISO
STANDARD 9735-5
Second edition
2002-07-01
Electronic data interchange for
administration, commerce and transport
(EDIFACT) — Application level syntax rules
(Syntax version number: 4, Syntax release
number: 1) —
Part 5:
Security rules for batch EDI (authenticity,
integrity and non-repudiation of origin)
Échange de données informatisé pour l'administration, le commerce
et le transport (EDIFACT) — Règles de syntaxe au niveau de l'application
(Numéro de version de syntaxe: 4, numéro d'édition de syntaxe: 1) —
Partie 5: Règles de sécurité pour EDI par lots (authenticité, intégrité
et non-répudiation de l'origine)

Reference number
©
ISO 2002
PDF disclaimer
This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but shall not
be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this
file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat accepts no liability in this
area.
Adobe is a trademark of Adobe Systems Incorporated.
Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters
were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event
that a problem relating to it is found, please inform the Central Secretariat at the address given below.

©  ISO 2002
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic
or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISO's member body
in the country of the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.ch
Web www.iso.ch
Printed in Switzerland
ii © ISO 2002 – All rights reserved

Contents Page
Foreword.iv
Introduction.vi
1 Scope .1
2 Conformance.1
3 Normative references.2
4 Terms and definitions .2
5 Rules for the use of security header and trailer segment groups for batch EDI .2
6 Rules for the use of interchange and group security header and trailer segment groups for
batch EDI .10
Annex A (informative) EDIFACT security threats and solutions.14
Annex B (informative) How to protect an EDIFACT structure .17
Annex C (informative) Message protection examples.20
Annex D (informative) Filter functions for UN/EDIFACT character set repertoires A and C .28
Annex E (informative) Security services and algorithms.31
Bibliography.38

Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies (ISO
member bodies). The work of preparing International Standards is normally carried out through ISO technical
committees. Each member body interested in a subject for which a technical committee has been established has
the right to be represented on that committee. International organizations, governmental and non-governmental, in
liaison with ISO, also take part in the work. ISO collaborates closely with the International Electrotechnical
Commission (IEC) on all matters of electrotechnical standardization.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 3.
The main task of technical committees is to prepare International Standards. Draft International Standards adopted
by the technical committees are circulated to the member bodies for voting. Publication as an International
Standard requires approval by at least 75 % of the member bodies casting a vote.
Attention is drawn to the possibility that some of the elements of this part of ISO 9735 may be the subject of patent
rights. ISO shall not be held responsible for identifying any or all such patent rights.
ISO 9735-5 was prepared by Technical Committee ISO/TC 154, Processes, data elements and documents in
commerce, industry and administration in collaboration with UN/CEFACT through the Joint Syntax Working Group
(JSWG).
This second edition cancels and replaces the first edition (ISO 9735-5:1999). However ISO 9735:1988 and its
Amendment 1:1992 are provisionally retained for the reasons given in clause 2.
Furthermore, for maintenance reasons the Syntax service directories have been removed from this and all other
parts of the ISO 9735 series. They are now consolidated in a new part, ISO 9735-10.
At the time of publication of ISO 9735-1:1998, ISO 9735-10 had been allocated as a part for “Security rules for
interactive EDI”. This was subsequently withdrawn because of lack of user support, and as a result, all relevant
references to the title “Security rules for interactive EDI” were removed in this second edition of ISO 9735-5.
Definitions from all parts of the ISO 9735 series have been consolidated and included in ISO 9735-1.
ISO 9735 consists of the following parts, under the general title Electronic data interchange for administration,
commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release
number: 1):
— Part 1: Syntax rules common to all parts
— Part 2: Syntax rules specific to batch EDI
— Part 3: Syntax rules specific to interactive EDI
— Part 4: Syntax and service report message for batch EDI (message type — CONTRL)
— Part 5: Security rules for batch EDI (authenticity, integrity and non-repudiation of origin)
— Part 6: Secure authentication and acknowledgement message (message type — AUTACK)
— Part 7: Security rules for batch EDI (confidentiality)
— Part 8: Associated data in EDI
iv © ISO 2002 – All rights reserved

— Part 9: Security key and certificate management message (message type — KEYMAN)
— Part 10: Syntax service directories
Further parts may be added in the future.
Annexes A to E of this part of ISO 9735 are for information only.
Introduction
This part of ISO 9735 includes the rules at the application level for the structuring of data in the interchange of
electronic messages in an open environment, based on the requirements of either batch or interactive processing.
These rules have been agreed by the United Nations Economic Commission for Europe (UN/ECE) as syntax rules
for Electronic Data Interchange for Administration, Commerce and Transport (EDIFACT) and are part of the United
Nations Trade Data Interchange Directory (UNTDID) which also includes both batch and interactive Message
Design Guidelines.
Communications specifications and protocols are outside the scope of this part of ISO 9735.
This is a new part, which has been added to ISO 9735. It provides an optional capability of securing batch
EDIFACT structures, i.e. messages, packages, groups or interchange.
vi © ISO 2002 – All rights reserved

INTERNATIONAL STANDARD ISO 9735-5:2002(E)

Electronic data interchange for administration, commerce and
transport (EDIFACT) — Application level syntax rules (Syntax
version number: 4, Syntax release number: 1) —
Part 5:
Security rules for batch EDI (authenticity, integrity
and non-repudiation of origin)
1 Scope
This part of ISO 9735 specifies syntax rules for EDIFACT security. It provides a method to address
message/package level, group level and interchange level security for authenticity, integrity and non-repudiation of
origin, in accordance with established security mechanisms.
2 Conformance
Whereas this part shall use a version number of “4” in the mandatory data element 0002 (Syntax version number),
and shall use a release number of “01” in the conditional data element 0076 (Syntax release number), each of
which appear in the segment UNB (Interchange header), interchanges continuing to use the syntax defined in the
earlier published versions shall use the following Syntax version numbers, in order to differentiate them from each
other and from this part:
 ISO 9735:1988 — Syntax version number: 1
 ISO 9735:1988 (amended and reprinted in 1990) — Syntax version number: 2
 ISO 9735:1988 and its Amendment 1:1992 — Syntax version number: 3
 ISO 9735:1998 — Syntax version number: 4
Conformance to a standard means that all of its requirements, including all options, are supported. If all options are
not supported, any claim of conformance shall include a statement which identifies those options to which
conformance is claimed.
Data that is interchanged is in conformance if the structure and representation of the data conform to the syntax
rules specified in this part of ISO 9735.
Devices supporting this part of ISO 9735 are in conformance when they are capable of creating and/or interpreting
the data structured and represented in conformance with this part of ISO 9735.
Conformance to this part of ISO 9735 shall include conformance to parts 1, 2, 8 and 10 of ISO 9735.
When identified in this part of ISO 9735, provisions defined in related standards shall form part of the conformance
criteria.
3 Normative references
The following normative documents contain provisions which, through reference in this text, constitute provisions of
this part of ISO 9735. For dated references, subsequent amendments to, or revisions of, any of these publications
do not apply. However, parties to agreements based on this part of ISO 9735 are encouraged to investigate the
possibility of applying the most recent editions of the normative documents indicated below. For undated
references, the latest edition of the normative document referred to applies. Members of ISO and IEC maintain
registers of currently valid International Standards.
ISO 9735-1:2002, Electronic data interchange for administration, commerce and transport (EDIFACT) —
Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 1: Syntax rules
common to all parts
ISO 9735-2:2002, Electronic data interchange for administration, commerce and transport (EDIFACT) —
Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 2: Syntax rules specific
to batch EDI
ISO 9735-6:2002, Electronic data interchange for administration, commerce and transport (EDIFACT) —
Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 6: Secure
authentication and acknowledgement message (message type — AUTACK)
ISO 9735-7:2002, Electronic data interchange for administration, commerce and transport (EDIFACT) —
Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 7: Security rules for
batch EDI (confidentiality)
ISO 9735-8:2002, Electronic data interchange for administration, commerce and transport (EDIFACT) —
Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 8: Associated data in
EDI
ISO 9735-10:2002, Electronic data interchange for administration, commerce and transport (EDIFACT) —
Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 10: Syntax service
directories
ISO/IEC 10181-2:1996, Information technology — Open Systems Interconnection — Security frameworks for open
systems: Authentication framework
ISO/IEC 10181-4:1997, Information technology — Open Systems Interconnection — Security frameworks for open
systems: Non-repudiation framework
ISO/IEC 10181-6:1996, Information technology — Open Systems Interconnection — Security frameworks for open
systems: Integrity framework
4 Terms and definitions
For the purposes of this part of ISO 9735, the terms and definitions given in ISO 9735-1 apply.
5 Rules for the use of security header and trailer segment groups for batch EDI
5.1 Message/package level security — integrated message/package security
5.1.1 General
The security threats relevant to message/package transmission and the security services which address them are
described in annexes A and B.
This subclause describes the structure of EDIFACT message/package level security.
2 © ISO 2002 – All rights reserved

Security services addressed in this part of ISO 9735 shall be provided by the inclusion of security header and trailer
segment groups after the UNH and before the UNT, in a way which shall be applied to any existing message, or
after the UNO and before the UNP, for any existing package.
5.1.2 Security header and trailer segment groups
Figure 1 describes an interchange showing security at message level.

Figure 1 — Interchange showing security at message level (schematic)

Figure 2 describes an interchange showing security at package level.

Figure 2 — Interchange showing security at package level (schematic)
5.1.3 Security header and trailer segment groups structure
Table 1 — Security header and security trailer segment groups segment table (message level security)
TAG Name S R
UNH Message Header M 1
----- Segment Group 1 ---------------- C 99 --------+
USH Security Header M 1 I
USA Security Algorithm C 3 I
----- Segment Group 2 ---------------- C 2 ----+  I
USC Certificate M 1   I  I
USA Security Algorithm C 3   I  I
USR Security Result C 1 --------+

Message body
----- Segment Group n ---------------- C 99 ----+
UST Security Trailer M 1   I
USR Security Result C 1 ----+
UNT Message Trailer M 1
Table 2 — Security header and security trailer segment groups segment table (package level security)
TAG Name S R
UNO Object Header M 1
----- Segment Group 1 ---------------- C 99 --------+
USH Security Header M 1 I
USA Security Algorithm C 3 I
----- Segment Group 2 ---------------- C 2 ----+  I
USC Certificate M 1   I  I
USA Security Algorithm C 3   I  I
USR Security Result C 1 --------+

Object
----- Segment Group n ---------------- C 99 ----+
UST Security Trailer M 1   I
USR Security Result C 1 ----+
UNP Object Trailer M 1
NOTE The complete directory specification of the segments and data elements, including segments UNH message
header, UNT message trailer, UNO object header and UNP object trailer are specified in ISO 9735-10. They are not described
further in this part of ISO 9735.
5.1.4 Data segment clarification
Segment Group 1: USH-USA-SG2 (security header group)
A group of segments identifying the security service and security mechanisms applied and containing the data
necessary to carry out the validation calculations.
There may be several different security header segment groups within the same message/package, if different
security services are applied to the message/package (e. g. integrity and non-repudiation of origin) or if the same
security service is applied by several parties.
USH, Security header
A segment specifying a security service applied to the message/package in which the segment is included.
4 © ISO 2002 – All rights reserved

The parties involved in the security service (security elements originator and security elements recipient), may
be identified in this segment, unless they are unambiguously identified by means of certificates (USC segment)
when asymmetric algorithms are used.
Security identification details composite data element (S500) shall be used in USH segment either:
 if symmetric algorithms are used, or
 if asymmetric algorithms are used and when two certificates are present, in order to distinguish between
the originator and the recipient certificates
In this latter case, the identification of the party in S500 (any of the data elements S500/0511, S500/0513,
S500/0515, S500/0586) shall be the same as the identification of the party, qualified as “certificate owner” in
one of the S500 present in the USC segment in segment group 2, and data element S500/0577 shall identify
the function (originator or recipient) of the party involved.
Data element key name in security identification details composite data element (S500/0538) may be used to
establish the key relationship between the sending and receiving parties.
This key relationship may also be established by using the data element identification of the key of the
algorithm parameter composite data element (S503/0554) in the USA segment of segment group 1.
S500/0538 in USH segment may be used if there is no need to convey a USA segment in segment group 1
(because the cryptographic mechanisms have been agreed previously between the partners).
Nevertheless, it is strongly recommended to use either S500/0538 in the USH segment, or S503/0554 with the
appropriate qualifier in the USA segment, but not both of them, within the same security header group.
USH segment may specify the filter function used for the binary fields of USA segment within segment group 1
and of the USR segment of the corresponding security trailer group.
USH segment may include a security sequence number, to provide sequence integrity, and the date of
creation of the security elements.
USA, Security algorithm
A segment identifying a security algorithm, the technical usage made of it, and containing the technical
parameters required. This shall be the algorithm applied directly on the message/package. This algorithm may
be either symmetric, a hash function or a compression algorithm. For example, for a digital signature, it
indicates the message-dependent hash function to be used.
Asymmetric algorithms shall not be referred to directly in this USA segment within segment group 1 but may
appear only within segment group 2, triggered by a USC segment.
Three occurrences of the USA segment are allowed. One occurrence shall be used for the symmetric
algorithm or the hash function required to provide the security service specified in the USH segment. The other
two occurrences are described in ISO 9735-7.
Indication of padding mechanism may be used when appropriate.
Segment Group 2: USC-USA-USR (certificate group)
A group of segments containing the data necessary to validate the security methods applied to the
message/package, when asymmetric algorithms are used. Certificate segment group shall be used when
asymmetric algorithms are used to identify the asymmetric key pair used, even if certificates are not used.
Either the full certificate segment group (including the USR segment), or the only data elements necessary to
identify unambiguously the asymmetric key pair used, shall be present in the USC segment. The presence of a full
certificate may be avoided if the certificate has already been exchanged by the two parties, or if it may be retrieved
from a database.
Where it is decided to refer to a non-EDIFACT certificate (such as X.509), the certificate syntax and version shall
be identified in data element 0545 of the USC segment. Such certificates may be conveyed in an EDIFACT
package.
Two occurrences of this segment group are allowed, one being the message/package sender certificate (that the
message/package receiver will use to verify the sender's signature), the other being the message/package receiver
certificate (only referred to by certificate reference) in the case where the receiver public key is used by the sender
for confidentiality of symmetric keys.
If both are present within one security header segment group, the security identification details composite data
element (S500) together with the certificate reference data element (0536) allow them to be differentiated.
This segment group shall be omitted if no asymmetric algorithm is used.
USC, Certificate
A segment containing the credentials of the certificate owner and identifying the certification authority which
has generated the certificate. The data element filter function, coded (0505) shall identify the filter function
used for the binary fields of USA segments and USR segment within segment group 2.
USC certificate may contain two occurrences of S500: one for the certificate owner (identifying the party which
signs with the private key associated to the public key contained in this certificate), one for the certificate issuer
(certification authority or CA).
USA, Security algorithm
A segment identifying a security algorithm, the technical usage made of it, and containing the technical
parameters required. The three different occurrences of this USA segment in segment group 2 are identifying:
1 the algorithm used by the certificate issuer to compute the hash value of the certificate (hashing function);
2 the algorithm used by the certificate issuer to generate the certificate (i.e. to sign the result of the hash
function computed on the certificate content) (asymmetric algorithm);
3a - either the algorithm used by the sender to sign the message/package (i.e. to sign the result of the hash
function described in the USH segment, computed on the message/package content) (asymmetric
algorithm);
3b - or the receiver's asymmetric algorithm used by the sender to encrypt the key required by a symmetric
algorithm applied to the message/package content and referred to by the segment group 1 triggered by
the USH segment (asymmetric algorithm).
Indication of padding mechanism may be used when appropriate.
USR, Security result
A segment containing the result of the security functions applied to the certificate by the certification authority.
This result shall be the signature of the certificate computed by the certification authority by signing the hash
result computed on the data of the credentials.
For the certificate, the signature computation starts with the first character of the USC segment (namely the
“U”) and ends with the last character of the last USA segment (including the separator following this USA
segment).
6 © ISO 2002 – All rights reserved

Segment Group n: UST-USR (security trailer group)
A group of segments containing a link with security header segment group and the result of the security functions
applied to the message/package.
UST, Security trailer
A segment establishing a link between security header and security trailer segment groups, and stating the
number of security segments contained in these groups.
USR, Security result
A segment containing the result of the security functions applied to the message/package as specified in the
linked security header group. Depending on the security mechanisms specified in the linked security header
group, this result shall be either:
 computed directly on the message/package by the algorithm specified in the USA segment within
segment group 1 of the security header group, or
 computed by signing with an asymmetric algorithm specified in USA segment within segment group 2 of
the security header segment group a hash result computed on the message/package by the algorithm
specified in the USA segment within segment group 1 of the security header segment group.
5.1.5 Scope of security application
There are two possibilities for the scope of security application:
1. The computation of each of the integrity and authentication values and of the digital signatures starts with and
includes the current security header segment group and the message body, or object, itself. In this case no
other security header or security trailer segment groups shall be encompassed within this scope.
The security header segment group shall be counted from the first character, namely a “U”, to the separator
ending this security header segment group, both included, and the message body, or object, from the first
character following the separator ending the last security header segment group to the separator preceding the
first character of the first security trailer segment group, both included.
Thus the order in which security services integrated in this manner are performed, is not prescribed. They are
completely independent of each other.
Figure 3 illustrates this case (the scope of application of the security service defined in the security header 2 is
represented by shaded boxes).
Security Security Security Security Security Security
UNH/ header header header MESSAGE BODY/ trailer trailer trailer UNT/
UNO segment segment segment OBJECT segment segment segment UNP
group 3 group 2 group 1 group 1 group 2 group 3
Figure 3 — Scope of application: security header segment group and message body/object only
(schematic)
2. The computation starts with and includes the current security header segment group to the associated security
trailer segment group. In this case the current security header segment group, the message body, or object,
and all the other embedded security header and trailer segment groups shall be encompassed within this
scope.
The scope shall include every character from the first character, namely a “U”, of the current security header
segment group, to the separator preceding the first character of the associated security trailer segment group,
both included.
Figure 4 illustrates this case (the scope of application of the security service defined in the security header 2 is
represented by shaded boxes).
Security Security Security Security Security Security
UNH/ header header header MESSAGE BODY/ trailer trailer trailer UNT/
UNO segment segment segment OBJECT segment segment segment UNP
group 3 group 2 group 1 group 1 group 2 group 3
Figure 4 — Scope of application: from security header segment group to security trailer segment group
(schematic)
For each added security service, either of the two approaches may be chosen.
In both cases, the relation between the security header segment group and associated security trailer segment
group shall be provided by the data elements security reference number of the USH and of the UST segments.
5.2 Principles of usage
5.2.1 Choice of service
The security header segment group may include the following general information:
 security service applied;
 identification of the parties involved;
 security mechanism used;
 “unique” value (sequence number and/or timestamp);
 non-repudiation of receipt request.
If more than one security service is required for the same EDIFACT structure, then the security header segment
group may be present several times. This shall be the case when several pairs of parties are involved. However, if
several services are required between the same two parties they may be included in a single pair of security
header and trailer segment groups, as certain services include others implicitly.
5.2.2 Authenticity
If origin authentication of a EDIFACT structure is required, it shall be provided in accordance to the principles
defined in ISO/IEC 10181-2, using an appropriate pair of security header and security trailer segment groups.
The security service of origin authentication shall be specified in the USH segment and the algorithm shall be
identified in the USA segment in segment group 1. It shall be a symmetric algorithm.
The party acting as security originator shall compute an authenticity value that shall be conveyed in the USR
segment of the security trailer segment group. The party acting as security recipient shall check the authenticity
value.
This service may include integrity service and may be obtained as a subproduct of non-repudiation of origin
service.
8 © ISO 2002 – All rights reserved

If an appropriate implementation of this “origin authentication” service, based on tamper resistant hardware or
trusted third parties, is used, it may be considered as an instance of “non repudiation of origin” service. Such a
practice shall be defined in the interchange agreement.
5.2.3 Integrity
If content integrity of a EDIFACT structure is required, it shall be provided in accordance to the principles defined in
ISO/IEC 10181-6, using an appropriate pair of security header and security trailer segment groups.
The security service of integrity shall be specified in the USH segment and the algorithm shall be identified in the
USA segment in segment group 1. It shall be hash function or a symmetric algorithm.
The party acting as security originator shall compute an integrity value that shall be conveyed in the USR segment
of the security trailer segment group. The party acting as security recipient shall check the integrity value.
This service may be obtained as a subproduct of origin authentication service or of non-repudiation of origin
service.
If sequence integrity is required, either a security sequence number or a security timestamp, or both, shall be
contained by the security header segment group and either content integrity service or origin authentication service
or non-repudiation of origin service shall be used.
5.2.4 Non-repudiation of origin
If non-repudiation of origin of a EDIFACT structure is required, it shall be provided in accordance to the principles
defined in ISO/IEC 10181-4, using an appropriate pair of security header and security trailer segment groups.
The security service of non-repudiation of origin shall be specified in the USH segment and the hashing algorithm
shall be identified in the USA segment in segment group 1, and the asymmetric algorithm used for signature in the
USA segments of segment group 2, if certificates are used.
If the certificate is not conveyed in the message/package, the asymmetric algorithm shall be implicitly known by the
receiving party. In this case the asymmetric algorithm shall be defined in the interchange agreement.
The party acting as security originator shall compute a digital signature that shall be conveyed in the USR segment
of the security trailer segment group. The party acting as security recipient shall verify the digital signature value.
This service provides also content integrity and origin authentication services.
5.3 Internal representation and filters for compliance with EDIFACT syntax
The use of mathematical algorithms to compute integrity values and digital signatures introduces two problems.
The first problem is that the result of the calculation depends on the internal representation of the character set.
Thus the computation of the digital signature by the sender and its verification by the recipient shall be executed
using the same character set encoding. Therefore the sender may indicate the representation used to produce the
original security validation result.
The second problem is that the result of the calculation is a seemingly random bit pattern. This may cause
problems during transmission and with interpretation software. To avoid these problems the bit pattern may be
reversibly mapped on to a particular representation of the character set used by means of a filtering function. For
simplicity, only one filtering function shall be used for each security service. Any appearance of an anomalous
terminator in the output of this mapping is dealt with by including an escape sequence.
6 Rules for the use of interchange and group security header and trailer segment
groups for batch EDI
6.1 Group and interchange level security — integrated message security
The security threats relevant to message/package transmission and the security services which address them, as
described in annexes A and B, are also valid at group and interchange level.
The techniques described in the previous clause for applying security to messages/packages may also be applied
to interchanges and groups.
For group and interchange level security, the same header and trailer segment groups as those described at
message/package level, shall be used, and header-trailer cross referencing shall always apply at the same level,
even when security is applied separately at more than one level.
When security is applied at message/package level, the protected structure is the message body or object. At
group level, it is the set of messages/packages in the group including all message/package headers and trailers. At
interchange level, it is the set of messages/packages or groups in the interchange, including all message/package
or group headers and trailers.
6.2 Security header and trailer segment groups
Figure 5 describes an interchange showing security at both interchange and group levels.

Figure 5 — Interchange showing security at both interchange and group levels (schematic)
10 © ISO 2002 – All rights reserved

6.3 Security header and trailer segment groups structure
Table 3 — Security header and security trailer segment groups segment table
(interchange level security only)
TAG Name S R
UNB Interchange Header M 1
----- Segment Group 1 ---------------- C 99 --------+
USH Security Header M 1 I
USA Security Algorithm C 3 I
----- Segment Group 2 ---------------- C 2 ----+  I
USC Certificate M 1   I  I
USA Security Algorithm C 3   I  I
USR Security Result C 1 --------+

Group(s) or Message(s)/Package(s)
----- Segment Group n ---------------- C 99 ----+
UST Security Trailer M 1   I
USR Security Result C 1 ----+
UNZ Interchange Trailer M 1
Table 4 — Security header and security trailer segment groups segment table (group level security only)
TAG Name S R
UNG Group Header M 1
----- Segment Group 1 ---------------- C 99 --------+
USH Security Header M 1 I
USA Security Algorithm C 3 I
----- Segment Group 2 ---------------- C 2 ----+ I
USC Certificate M 1   I  I
USA Security Algorithm C 3   I  I
USR Security Result C 1 --------+

Message(s)/Package(s)
----- Segment Group n ---------------- C 99 ----+
UST Security Trailer M 1   I
USR Security Result C 1 ----+
UNE Group Trailer M 1
NOTE The complete directory specification of the segments and data elements, including segments UNB interchange
header, UNZ interchange trailer, UNG group header and UNE group trailer are specified in ISO 9735-10. They are not
described further in this part of ISO 9735.
6.4 Scope of security application
There are two possibilities for the scope of security application:
1. The computation of each of the integrity and authentication values and of the digital signatures starts with and
includes the current security header segment group and the group(s) or message(s)/package(s), themselves.
In this case no other security header or security trailer segment groups shall be encompassed within this
scope.
The security header segment group shall be counted from the first character, namely a “U”, to the separator
ending this security header segment group, both included, and the group(s) or message(s)/package(s), from
the first character following the separator ending the last security header segment group to the separator
preceding the first character of the first security trailer segment group, both included.
Thus the order in which security services integrated in this manner are performed, is not prescribed. They are
completely independent of each other.
Figures 6 and 7 illustrate this case (the scope of application of the security service defined in the security
header 2 is represented by shaded boxes).

Security Security Security Security Security Security
GROUP(S)
header header header trailer trailer trailer
UNB OR UNZ
segment segment segment segment segment segment
MESSAGE(S)/PACKAGE(S)
group 3 group 2 group 1 group 1 group 2 group 3
Figure 6 — Scope of application: security header segment group and group(s) or message(s)/package(s)
only (schematic)
Security Security Security Security Security Security
header header header trailer trailer trailer
UNG MESSAGE(S)/PACKAGE(S) UNE
segment segment segment segment segment segment
group 3 group 2 group 1 group 1 group 2 group 3
Figure 7 — Scope of application: security header segment group and message(s)/package(s) only
(schematic)
2. The computation starts with and includes the current security header segment group to the associated security
trailer segment group. In this case the current security header segment group, the group(s) or
message(s)/package(s), and all the other embedded security header and trailer segment groups shall be
encompassed within this scope.
The scope shall include every character from the first character, namely a “U”, of the current security header
segment group, to the separator preceding the first character of the associated security trailer segment group,
both included.
Figures 8 and 9 illustrate this case (the scope of application of the security service defined in the security
header 2 is represented by shaded boxes).

Security Security Security Security Security Security
GROUP(S)
header header header trailer trailer trailer
UNB OR UNZ
segment segment segment segment segment segment
MESSAGE(S)/PACKAGE(S)
group 3 group 2 group 1 group 1 group 2 group 3
Figure 8 — Scope of application: from security header segment group to security trailer segment group
(schematic)
Security Security Security Security Security Security
header header header trailer trailer trailer
UNG MESSAGE(S)/PACKAGE(S) UNE
segment segment segment segment segment segment
group 3 group 2 group 1 group 1 group 2 group 3
Figure 9 — Scope of application: from security header segment group to security trailer segment group
(schematic)
12 © ISO 2002 – All rights reserved

For each added security service, either of the two approaches may be chosen.
In both cases, the relation between the security header segment group and associated security trailer segment
group shall be provided by the data elements security reference number of the USH and of the UST segments.
Annex A
(informative)
EDIFACT security threats and solutions
A.1 Introduction
This annex describes the generic security threats to message/package transmission, between the originator(s) of
the message/package and the recipient(s). The general approaches to overcome these threats are also covered.
These threats and solutions are relevant at any level: message/package, group or interchange.
A.2 Security threats
The storage and transfer of EDIFACT messages/packages via electronic media and means expose them to a
number of threats, notably:
 the unauthorized disclosure of message/package content;
 the intentional insertion of non-bonafide messages/packages;
 the duplication, loss or replay of messages/packages;
 the modification of message/package content;
 the deletion of messages/packages;
 the repudiation of message/package responsibility by its sender or its receiver.
These threats may be intentionally perpetrated, as with the unauthorized manipulation of message/package
content, or unintentionally perpetrated, as with a communication error resulting in the modification of
message/package content.
A.3 Security solutions — Basic services and principles of usage
A.3.1 General
To counter the aforementioned threats a number of security mechanisms have been identified which utilize one or
more methodologies to meet their objectives.
It is important to be able to identify unambiguously the parties involved when messages/packages are secured —
the security originator, henceforth called the sender for simplicity, who secures the message/package prior to
transmission, and the security recipient, henceforth called the receiver, who performs checks on the received
message/package. These parties may be identified in the security segments. This identification may be performed
by means of so-called certificates (in fact, either the certificate itself or a certificate reference), explained below, if
asymmetric algorithms are used.
Typically, the use of a certification authority (CA) is required in an open system. This is a third party which is trusted
by the involved parties to a limited degree, namely to identify and register all users with their public key. This
information is conveyed to other users by means of a certificate, which is a digital signature issued by the CA on a
message which consists of user identification information and the user's public key. In this situation, the trust is
purely functional and does not involve secret or private keys.
14 © ISO 2002 – All rights reserved

Alternatively, if symmetric techniques are used the identity of the parties involved would be indicated in the security
sender/recipient name fields.
A message/package may be secured by several parties (for example a message/package may have multiple digital
signatures) and so the security related information may be repeated to allow the identification of several signing or
authenticating parties and correspondingly to include several digital signatures or control values.
The requirements and techniques prescribed for securing EDIFACT messages/packages, groups or interchanges
are presented below.
A.3.2 Sequence integrity
Sequence integrity protects against the duplication, addition, deletion, loss or replay of an EDIFACT structure
(message/package, group or interchange).
To detect lost messages/packages, groups or interchanges
 the sender may include and the receiver check a sequence number (related to the message/package flow
between the two parties concerned);
 the sender may request and check an acknowledgement.
To detect added or duplicated messages/packages, groups or interchanges
 the sender may include and the receiver check a sequence number.
 the sender may include and the receiver check a time stamp.
When sequence numbers are used it shall be agreed between the parties how these are to be managed.
The timestamp will normally be produced by
...


PREDSTANDARDElektronska menjava podatkov (-računalniška-) v administraciji (upravi), trgovini in transportu (prevozništvu) EDIFACT
- Pravila sintakse za uporabniški nivo (izvedbena oblika sintakse: 4, zaporedna št. izdaje 1) Peti del: varnostna pravila za šaržno EDI (elektronsko menjavanje podatkov).Electronic data interchange for administration,
commerce and transport (EDIFACT) - Application
level syntax rules (Syntax version number: 4,
Syntax release number: 1) - Part 5: Security rules
for batch EDI (authenticity, integrity and non- repudiation of origin)©
Standard je založil in izdal Slovenski inštitut za standardizacijo. Razmnoževanje ali kopiranje celote ali delov tega dokumenta ni dovoljenoReferenčna številkaOSIST ISO 9735-5:2004(en)ICS35.240.60

Reference numberISO 9735-5:2002(E)© ISO 2002
INTERNATIONAL STANDARD ISO9735-5Second edition2002-07-01Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 5: Security rules for batch EDI (authenticity, integrity and non-repudiation of origin) Échange de données informatisé pour l'administration, le commerce
et le transport (EDIFACT) — Règles de syntaxe au niveau de l'application (Numéro de version de syntaxe: 4, numéro d'édition de syntaxe: 1) — Partie 5: Règles de sécurité pour EDI par lots (authenticité, intégrité
et non-répudiation de l'origine)

©
ISO 2002 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISO's member body in the country of the requester. ISO copyright office Case postale 56 • CH-1211 Geneva 20 Tel.
+ 41 22 749 01 11 Fax
+ 41 22 749 09 47 E-mail
copyright@iso.ch Web
www.iso.ch Printed in Switzerland
ii © ISO 2002 – All rights reserved

EDIFACT security threats and solutions.14 Annex B (informative)
How to protect an EDIFACT structure.17 Annex C (informative)
Message protection examples.20 Annex D (informative)
Filter functions for UN/EDIFACT character set repertoires A and C.28 Annex E (informative)
Security services and algorithms.31 Bibliography.38

Foreword ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies (ISO member bodies). The work of preparing International Standards is normally carried out through ISO technical committees. Each member body interested in a subject for which a technical committee has been established has the right to be represented on that committee. International organizations, governmental and non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 3. The main task of technical committees is to prepare International Standards. Draft International Standards adopted by the technical committees are circulated to the member bodies for voting. Publication as an International Standard requires approval by at least 75 % of the member bodies casting a vote. Attention is drawn to the possibility that some of the elements of this part of ISO 9735 may be the subject of patent rights. ISO shall not be held responsible for identifying any or all such patent rights. ISO 9735-5 was prepared by Technical Committee ISO/TC 154, Processes, data elements and documents in commerce, industry and administration in collaboration with UN/CEFACT through the Joint Syntax Working Group (JSWG). This second edition cancels and replaces the first edition (ISO 9735-5:1999). However ISO 9735:1988 and its Amendment 1:1992 are provisionally retained for the reasons given in clause 2. Furthermore, for maintenance reasons the Syntax service directories have been removed from this and all other parts of the ISO 9735 series. They are now consolidated in a new part, ISO 9735-10. At the time of publication of ISO 9735-1:1998, ISO 9735-10 had been allocated as a part for “Security rules for interactive EDI”. This was subsequently withdrawn because of lack of user support, and as a result, all relevant references to the title “Security rules for interactive EDI” were removed in this second edition of ISO 9735-5. Definitions from all parts of the ISO 9735 series have been consolidated and included in ISO 9735-1. ISO 9735 consists of the following parts, under the general title Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1): — Part 1: Syntax rules common to all parts — Part 2: Syntax rules specific to batch EDI — Part 3: Syntax rules specific to interactive EDI — Part 4: Syntax and service report message for batch EDI (message type — CONTRL) — Part 5: Security rules for batch EDI (authenticity, integrity and non-repudiation of origin) — Part 6: Secure authentication and acknowledgement message (message type — AUTACK) — Part 7: Security rules for batch EDI (confidentiality) — Part 8: Associated data in EDI

Introduction This part of ISO 9735 includes the rules at the application level for the structuring of data in the interchange of electronic messages in an open environment, based on the requirements of either batch or interactive processing. These rules have been agreed by the United Nations Economic Commission for Europe (UN/ECE) as syntax rules for Electronic Data Interchange for Administration, Commerce and Transport (EDIFACT) and are part of the United Nations Trade Data Interchange Directory (UNTDID) which also includes both batch and interactive Message Design Guidelines. Communications specifications and protocols are outside the scope of this part of ISO 9735. This is a new part, which has been added to ISO 9735. It provides an optional capability of securing batch EDIFACT structures, i.e. messages, packages, groups or interchange.

INTERNATIONAL STANDARD ISO 9735-5:2002(E) © ISO 2002 – All rights reserved 1 Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 5: Security rules for batch EDI (authenticity, integrity
and non-repudiation of origin) 1 Scope This part of ISO 9735 specifies syntax rules for EDIFACT security. It provides a method to address message/package level, group level and interchange level security for authenticity, integrity and non-repudiation of origin, in accordance with established security mechanisms. 2 Conformance Whereas this part shall use a version number of “4” in the mandatory data element 0002 (Syntax version number), and shall use a release number of “01” in the conditional data element 0076 (Syntax release number), each of which appear in the segment UNB (Interchange header), interchanges continuing to use the syntax defined in the earlier published versions shall use the following Syntax version numbers, in order to differentiate them from each other and from this part:  ISO 9735:1988 — Syntax version number: 1  ISO 9735:1988 (amended and reprinted in 1990) — Syntax version number: 2  ISO 9735:1988 and its Amendment 1:1992 — Syntax version number: 3  ISO 9735:1998 — Syntax version number: 4 Conformance to a standard means that all of its requirements, including all options, are supported. If all options are not supported, any claim of conformance shall include a statement which identifies those options to which conformance is claimed. Data that is interchanged is in conformance if the structure and representation of the data conform to the syntax rules specified in this part of ISO 9735. Devices supporting this part of ISO 9735 are in conformance when they are capable of creating and/or interpreting the data structured and represented in conformance with this part of ISO 9735. Conformance to this part of ISO 9735 shall include conformance to parts 1, 2, 8 and 10 of ISO 9735. When identified in this part of ISO 9735, provisions defined in related standards shall form part of the conformance criteria.

3 Normative references The following normative documents contain provisions which, through reference in this text, constitute provisions of this part of ISO 9735. For dated references, subsequent amendments to, or revisions of, any of these publications do not apply. However, parties to agreements based on this part of ISO 9735 are encouraged to investigate the possibility of applying the most recent editions of the normative documents indicated below. For undated references, the latest edition of the normative document referred to applies. Members of ISO and IEC maintain registers of currently valid International Standards. ISO 9735-1:2002, Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 1: Syntax rules common to all parts ISO 9735-2:2002, Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 2: Syntax rules specific to batch EDI ISO 9735-6:2002, Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 6: Secure authentication and acknowledgement message (message type — AUTACK) ISO 9735-7:2002, Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 7: Security rules for batch EDI (confidentiality) ISO 9735-8:2002, Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 8: Associated data in EDI ISO 9735-10:2002, Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 10: Syntax service directories ISO/IEC 10181-2:1996, Information technology — Open Systems Interconnection — Security frameworks for open systems: Authentication framework ISO/IEC 10181-4:1997, Information technology — Open Systems Interconnection — Security frameworks for open systems: Non-repudiation framework ISO/IEC 10181-6:1996, Information technology — Open Systems Interconnection — Security frameworks for open systems: Integrity framework 4 Terms and definitions For the purposes of this part of ISO 9735, the terms and definitions given in ISO 9735-1 apply. 5 Rules for the use of security header and trailer segment groups for batch EDI 5.1 Message/package level security — integrated message/package security 5.1.1 General The security threats relevant to message/package transmission and the security services which address them are described in annexes A and B. This subclause describes the structure of EDIFACT message/package level security.

Figure 1 — Interchange showing security at message level (schematic)
Figure 2 describes an interchange showing security at package level.
Figure 2 — Interchange showing security at package level (schematic)

5.1.3 Security header and trailer segment groups structure Table 1 — Security header and security trailer segment groups segment table (message level security) TAG Name S R
UNH Message Header M 1
----- Segment Group 1 ---------------- C 99 --------+ USH Security Header M 1 I USA Security Algorithm C 3 I ----- Segment Group 2 ---------------- C 2 ----+
I USC Certificate M 1
I
I USA Security Algorithm C 3
I
I USR Security Result C 1 --------+
Message body
----- Segment Group n ---------------- C 99 ----+ UST Security Trailer M 1
I USR Security Result C 1 ----+ UNT Message Trailer M 1
Table 2 — Security header and security trailer segment groups segment table (package level security) TAG Name S R
UNO Object Header M 1
----- Segment Group 1 ---------------- C 99 --------+ USH Security Header M 1 I USA Security Algorithm C 3 I ----- Segment Group 2 ---------------- C 2 ----+
I USC Certificate M 1
I
I USA Security Algorithm C 3
I
I USR Security Result C 1 --------+
Object
----- Segment Group n ---------------- C 99 ----+ UST Security Trailer M 1
I USR Security Result C 1 ----+ UNP Object Trailer M 1
NOTE The complete directory specification of the segments and data elements, including segments UNH message header, UNT message trailer, UNO object header and UNP object trailer are specified in ISO 9735-10. They are not described further in this part of ISO 9735. 5.1.4 Data segment clarification Segment Group 1: USH-USA-SG2 (security header group) A group of segments identifying the security service and security mechanisms applied and containing the data necessary to carry out the validation calculations. There may be several different security header segment groups within the same message/package, if different security services are applied to the message/package (e. g. integrity and non-repudiation of origin) or if the same security service is applied by several parties. USH, Security header A segment specifying a security service applied to the message/package in which the segment is included.

certificate may be avoided if the certificate has already been exchanged by the two parties, or if it may be retrieved from a database. Where it is decided to refer to a non-EDIFACT certificate (such as X.509), the certificate syntax and version shall be identified in data element 0545 of the USC segment. Such certificates may be conveyed in an EDIFACT package. Two occurrences of this segment group are allowed, one being the message/package sender certificate (that the message/package receiver will use to verify the sender's signature), the other being the message/package receiver certificate (only referred to by certificate reference) in the case where the receiver public key is used by the sender for confidentiality of symmetric keys. If both are present within one security header segment group, the security identification details composite data element (S500) together with the certificate reference data element (0536) allow them to be differentiated. This segment group shall be omitted if no asymmetric algorithm is used. USC, Certificate A segment containing the credentials of the certificate owner and identifying the certification authority which has generated the certificate. The data element filter function, coded (0505) shall identify the filter function used for the binary fields of USA segments and USR segment within segment group 2. USC certificate may contain two occurrences of S500: one for the certificate owner (identifying the party which signs with the private key associated to the public key contained in this certificate), one for the certificate issuer (certification authority or CA). USA, Security algorithm A segment identifying a security algorithm, the technical usage made of it, and containing the technical parameters required. The three different occurrences of this USA segment in segment group 2 are identifying: 1 the algorithm used by the certificate issuer to compute the hash value of the certificate (hashing function); 2 the algorithm used by the certificate issuer to generate the certificate (i.e. to sign the result of the hash function computed on the certificate content) (asymmetric algorithm); 3a - either the algorithm used by the sender to sign the message/package (i.e. to sign the result of the hash function described in the USH segment, computed on the message/package content) (asymmetric algorithm); 3b - or the receiver's asymmetric algorithm used by the sender to encrypt the key required by a symmetric algorithm applied to the message/package content and referred to by the segment group 1 triggered by the USH segment (asymmetric algorithm). Indication of padding mechanism may be used when appropriate. USR, Security result A segment containing the result of the security functions applied to the certificate by the certification authority. This result shall be the signature of the certificate computed by the certification authority by signing the hash result computed on the data of the credentials. For the certificate, the signature computation starts with the first character of the USC segment (namely the “U”) and ends with the last character of the last USA segment (including the separator following this USA segment).

UNH/UNO Security header segment group 3 Security header segment group 2 Security header segment group 1 MESSAGE BODY/ OBJECT Security trailer segment group 1 Security trailer segment group 2 Security trailer segment group 3 UNT/UNP Figure 3 — Scope of application: security header segment group and message body/object only (schematic) 2. The computation starts with and includes the current security header segment group to the associated security trailer segment group. In this case the current security header segment group, the message body, or object, and all the other embedded security header and trailer segment groups shall be encompassed within this scope.

The scope shall include every character from the first character, namely a “U”, of the current security header segment group, to the separator preceding the first character of the associated security trailer segment group, both included. Figure 4 illustrates this case (the scope of application of the security service defined in the security header 2 is represented by shaded boxes).
UNH/UNO Security header segment group 3 Security header segment group 2 Security header segment group 1 MESSAGE BODY/ OBJECT Security trailer segment group 1 Security trailer segment group 2 Security trailer segmentgroup 3 UNT/UNP Figure 4 — Scope of application: from security header segment group to security trailer segment group (schematic) For each added security service, either of the two approaches may be chosen. In both cases, the relation between the security header segment group and associated security trailer segment group shall be provided by the data elements security reference number of the USH and of the UST segments. 5.2 Principles of usage 5.2.1 Choice of service The security header segment group may include the following general information:  security service applied;  identification of the parties involved;  security mechanism used;  “unique” value (sequence number and/or timestamp);  non-repudiation of receipt request. If more than one security service is required for the same EDIFACT structure, then the security header segment group may be present several times. This shall be the case when several pairs of parties are involved. However, if several services are required between the same two parties they may be included in a single pair of security header and trailer segment groups, as certain services include others implicitly. 5.2.2 Authenticity If origin authentication of a EDIFACT structure is required, it shall be provided in accordance to the principles defined in ISO/IEC 10181-2, using an appropriate pair of security header and security trailer segment groups. The security service of origin authentication shall be specified in the USH segment and the algorithm shall be identified in the USA segment in segment group 1. It shall be a symmetric algorithm. The party acting as security originator shall compute an authenticity value that shall be conveyed in the USR segment of the security trailer segment group. The party acting as security recipient shall check the authenticity value. This service may include integrity service and may be obtained as a subproduct of non-repudiation of origin service.

6 Rules for the use of interchange and group security header and trailer segment groups for batch EDI 6.1 Group and interchange level security — integrated message security The security threats relevant to message/package transmission and the security services which address them, as described in annexes A and B, are also valid at group and interchange level. The techniques described in the previous clause for applying security to messages/packages may also be applied to interchanges and groups. For group and interchange level security, the same header and trailer segment groups as those described at message/package level, shall be used, and header-trailer cross referencing shall always apply at the same level, even when security is applied separately at more than one level. When security is applied at message/package level, the protected structure is the message body or object. At group level, it is the set of messages/packages in the group including all message/package headers and trailers. At interchange level, it is the set of messages/packages or groups in the interchange, including all message/package or group headers and trailers. 6.2 Security header and trailer segment groups Figure 5 describes an interchange showing security at both interchange and group levels.
Figure 5 — Interchange showing security at both interchange and group levels (schematic)

UNB Interchange Header M 1
----- Segment Group 1 ---------------- C 99 --------+ USH Security Header M 1 I USA Security Algorithm C 3 I ----- Segment Group 2 ---------------- C 2 ----+
I USC Certificate M 1
I
I USA Security Algorithm C 3
I
I USR Security Result C 1 --------+
Group(s) or Message(s)/Package(s)
----- Segment Group n ---------------- C 99 ----+ UST Security Trailer M 1
I USR Security Result C 1 ----+ UNZ Interchange Trailer M 1
Table 4 — Security header and security trailer segment groups segment table (group level security only) TAG Name S R
UNG Group Header M 1
----- Segment Group 1 ---------------- C 99 --------+ USH Security Header M 1 I USA Security Algorithm C 3 I ----- Segment Group 2 ---------------- C 2 ----+
I USC Certificate M 1
I
I USA Security Algorithm C 3
I
I USR Security Result C 1 --------+
Message(s)/Package(s)
----- Segment Group n ---------------- C 99 ----+ UST Security Trailer M 1
I USR Security Result C 1 ----+ UNE Group Trailer M 1
NOTE The complete directory specification of the segments and data elements, including segments UNB interchange header, UNZ interchange trailer, UNG group header and UNE group trailer are specified in ISO 9735-10. They are not described further in this part of ISO 9735. 6.4 Scope of security application There are two possibilities for the scope of security application: 1. The computation of each of the integrity and authentication values and of the digital signatures starts with and includes the current security header segment group and the group(s) or message(s)/package(s), themselves. In this case no other security header or security trailer segment groups shall be encompassed within this scope. The security header segment group shall be counted from the first character, namely a “U”, to the separator ending this security header segment group, both included, and the group(s) or message(s)/package(s), from the first character following the separator ending the last security header segment group to the separator preceding the first character of the first security trailer segment group, both included.

Thus the order in which security services integrated in this manner are performed, is not prescribed. They are completely independent of each other. Figures 6 and 7 illustrate this case (the scope of application of the security service defined in the security header 2 is represented by shaded boxes).
UNB Security header segment group 3 Security header segment group 2 Security header
segment group 1 GROUP(S) OR MESSAGE(S)/PACKAGE(S) Security trailer segment group 1 Security trailer segment group 2 Security trailer segment group 3 UNZ Figure 6 — Scope of application: security header segment group and group(s) or message(s)/package(s) only (schematic)
UNG Security header segment group 3 Security header segment group 2 Security header segment group 1 MESSAGE(S)/PACKAGE(S) Security trailer segment group 1 Security trailer segment group 2 Security trailer segment group 3 UNE Figure 7 — Scope of application: security header segment group and message(s)/package(s) only (schematic) 2. The computation starts with and includes the current security header segment group to the associated security trailer segment group. In this case the current security header segment group, the group(s) or message(s)/package(s), and all the other embedded security header and trailer segment groups shall be encompassed within this scope. The scope shall include every character from the first character, namely a “U”, of the current security header segment group, to the separator preceding the first character of the associated security trailer segment group, both included. Figures 8 and 9 illustrate this case (the scope of application of the security service defined in the security header 2 is represented by shaded boxes).
UNB Security header segment group 3 Security header segment group 2 Security header segment group 1 GROUP(S) OR MESSAGE(S)/PACKAGE(S) Security trailer segment group 1 Security trailer segment group 2 Security trailer segment group 3 UNZ Figure 8 — Scope of application: from security header segment group to security trailer segment group (schematic)
UNG Security header segment group 3 Security header segment group 2 Security header segment group 1 MESSAGE(S)/PACKAGE(S) Security trailer segment group 1 Security trailer segment group 2 Security trailer segment group 3 UNE Figure 9 — Scope of application: from security header segment group to security trailer segment group (schematic)

Annex A (informative)
EDIFACT security threats and solutions A.1 Introduction This annex describes the generic security threats to message/package transmission, between the originator(s) of the message/package and the recipient(s). The general approaches to overcome these threats are also covered. These threats and solutions are relevant at any level: message/package, group or interchange. A.2 Security threats The storage and transfer of EDIFACT messages/packages via electronic media and means expose them to a number of threats, notably:  the unauthorized disclosure of message/package content;  the intentional insertion of non-bonafide messages/packages;  the duplication, loss or replay of messages/packages;  the modification of message/package content;  the deletion of messages/packages;  the repudiation of message/package responsibility by its sender or its receiver. These threats may be intentionally perpetrated, as with the unauthorized manipulation of message/package content, or unintentionally perpetrated, as with a communication error resulting in the modification of message/package content. A.3 Security solutions — Basic services and principles of usage A.3.1 General To counter the aforementioned threats a number of security mechanisms have been identified which utilize one or more methodologies to meet their objectives. It is important to be able to identify unambiguously the parties involved when messages/packages are secured — the security originator, henceforth called the sender for simplicity, who secures the message/package prior to transmission, and the security recipient, henceforth called the receiver, who performs checks on the received message/package. These parties may be identified in the security segments. This identification may be performed by means of so-called certificates (in fact, either the certificate itself or a certificate reference), explained below, if asymmetric algorithms are used.
Typically, the use of a certification authority (CA) is required in an open system. This is a third party which is trusted by the involved parties to a limited degree, namely to identify and register all users with their public key. This information is conveyed to other users by means of a certificate, which is a digital signature issued by the CA on a message which consists of user identification information and the user's public key. In this situation, the trust is purely functional and does not involve secret or private keys.
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...