ANSI ASC X9 X9.119-1-2016 Retail Financial Services - Requirements for Protection of Sensitive Payment Card Data - Part 1 Using Encryption Methods.pdf
《ANSI ASC X9 X9.119-1-2016 Retail Financial Services - Requirements for Protection of Sensitive Payment Card Data - Part 1 Using Encryption Methods.pdf》由会员分享,可在线阅读,更多相关《ANSI ASC X9 X9.119-1-2016 Retail Financial Services - Requirements for Protection of Sensitive Payment Card Data - Part 1 Using Encryption Methods.pdf(27页珍藏版)》请在麦多课文档分享上搜索。
1、 American National Standard for Financial Services ANSI X9.119-1-2016 Retail Financial Services Requirements for Protection of Sensitive Payment Card Data Part 1: Using Encryption Methods Accredited Standards Committee X9, Incorporated Financial Industry Standards Date Approved: May 27, 2016 America
2、n National Standards Institute American National Standards, Technical Reports and Guides developed through the Accredited Standards Committee X9, Inc., are copyrighted. Copying these documents for personal or commercial use outside X9 membership agreements is prohibited without express written permi
3、ssion of the Accredited Standards Committee X9, Inc. For additional information please contact ASC X9, Inc., 275 West Street, Suite 107, Annapolis, MD 21401. This page left intentionally blank ANSI X9.119-1-2016 ASC X9, Inc. 2016 All rights reserved iii Contents Page Foreword . v Introduction vi 1 S
4、cope 1 2 Normative references 2 2.1 ANS INCITS 92-1981 (R2003) - Information Technology - Data Encryption Algorithm (DEA) . 2 2.2 ANS X9.24-1-2009 Retail Financial Services Symmetric Key Management part 1: Using Symmetric Techniques . 2 2.3 ANS X9.24-2-2006 Retail Financial Services Symmetric Key Ma
5、nagement part 2: Using Asymmetric Techniques . 2 2.4 ANS X9.52-1998 - Triple Data Encryption Algorithm (TDEA) Modes of Operation . 2 2.5 ANS X9.65-2004 - Triple Data Encryption Algorithm (TDEA) Implementation 2 2.6 ANS X9.82-1-2006 Random Number Generation . 2 2.7 ANS X9.97-1-2009 - Financial Servic
6、es Secure Cryptographic Devices (Retail) Part 1: Concepts, Requirements, and Evaluation Methods. 2 2.8 ANS X9.104 (all parts)-2004 Financial Transaction Card Originated Messages . 2 2.9 ISO Technical Report 14742 Financial services Recommendations on Cryptographic Algorithms and Their Use. 2 2.10 IS
7、O/IEC 7813:2006 Information Technology Identification cards Financial transaction cards . 2 2.11 ISO/IEC 18033: Information Technology- Security techniques Encryption algorithms Part 3: Block Ciphers . 2 3 Terms and definitions . 2 3.1 Acquirer 2 3.2 Algorithm 3 3.3 Authorization Transaction 3 3.4 C
8、iphertext . 3 3.5 Cleartext . 3 Data in original, unencrypted form. 3 3.6 Cryptographic Key A parameter that determines the operation of a cryptographic function such as: 3 3.7 Data Encryption Algorithm (DEA) 3 3.8 Data Encryption Standard (DES) 3 3.9 Decryption 3 3.10 Encryption 3 3.11 Encryption A
9、lgorithm 4 3.12 Format Preserving Encryption . 4 3.13 IC Card 4 3.14 Infeasible A condition whereby a particular attack, although it may be technically possible, is not economically viable. E.g. the cost of the attack exceeds the economic benefit 4 3.15 Institution . 4 3.16 Interchange 4 3.17 Issuer
10、 4 3.18 Key 4 3.19 Plaintext 4 3.20 Point of Entry (POE) 4 ANSI X9.119-1-2016 iv ASC X9, Inc. 2016 All rights reserved 3.21 Privacy 4 3.22 Protection . 5 3.23 Secure Cryptographic Device (SCD) . 5 3.24 Sensitive payment card data 5 3.25 Triple Data Encryption Algorithm (TDEA) . 5 3.26 Transaction .
11、5 3.27 Verification . 5 4 Symbols and abbreviated terms 5 5 Sensitive Payment Card Data Elements 6 6 Sensitive Payment Card Data Protection Requirements . 6 6.1 General 6 6.2 Data Element Specific Requirements 7 6.2.1 Cardholder Name . 7 6.2.2 Primary Account Number (PAN) 7 6.2.3 Expiration Date. 8
12、6.2.4 Service Code 8 6.2.5 Discretionary Data . 8 6.2.6 Track Data . 9 6.2.7 Manually Entered Security Validation Code . 9 6.2.8 Matrix of Security Requirements and Recommendations for Protection of Sensitive Payment Card Data outside of an SCD and prior to the point of decryption 10 6.3 Requirement
13、s When Employing Encryption Methods to Protect Sensitive Payment Card Data 11 6.3.1 Data Encryption Algorithm and Key Strength Requirements .11 6.3.2 Data Encryption Key Management Security Requirements 11 6.3.3 Prevention of Dictionary Attacks .11 6.3.4 Distinguishing Protected Data from Cleartext
14、Data When Employing Format Preserving Methods 12 Annex A (normative) Acceptable Data Encryption Algorithms .13 A.1 General 13 A.2 Approved Algorithms 13 A.2.1 TDEA .13 A.2.2 AES 13 A.2.3 RSAES using OAEP (Optimal Asymmetric Encryption Padding) .13 A.3 Minimum Security Level 13 ANSI X9.119-1-2016 ASC
15、 X9, Inc. 2016 All rights reserved v Foreword Approval of an American National Standard requires verification by ANSI that the requirements for due process, consensus, and other criteria for approval have been met by the standards developer. Consensus is established when, in the judgment of the ANSI
16、 Board of Standards Review, substantial agreement has been reached by directly and materially affected interests. Substantial agreement means much more than a simple majority, but not necessarily unanimity. Consensus requires that all views and objections be considered, and that a concerted effort b
17、e made toward their resolution. The use of American National Standards is completely voluntary; their existence does not in any respect preclude anyone, whether he has approved the standards or not from manufacturing, marketing, purchasing, or using products, processes, or procedures not conforming
18、to the standards. The American National Standards Institute does not develop standards and will in no circumstances give an interpretation of any American National Standard. Moreover, no person shall have the right or authority to issue an interpretation of an American National Standard in the name
19、of the American National Standards Institute. Requests for interpretation should be addressed to the secretariat or sponsor whose name appears on the title page of this standard. CAUTION NOTICE: This American National Standard may be revised or withdrawn at any time. The procedures of the American N
20、ational Standards Institute require that action be taken to reaffirm, revise, or withdraw this standard no later than five years from the date of approval. Published by Accredited Standards Committee X9, Incorporated Financial Industry Standards 275 West Street, Suite 107 Annapolis, MD 21401 USA X9
21、Online http:/www.x9.org Copyright 2016 ASC X9, Inc. All rights reserved. No part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without prior written permission of the publisher. Published in the United States of America. ANSI X9.119-1-2016 vi ASC
22、X9, Inc. 2016 All rights reserved Introduction Suggestions for the improvement or revision of this Standard are welcome. They should be sent to the X9 Committee Secretariat, Accredited Standards Committee X9, Inc., Financial Industry Standards, 275 West Street, Suite 107, Annapolis, MD 21401 USA. Th
23、is Standard was processed and approved for submittal to ANSI by the Accredited Standards Committee on Financial Services, X9. Committee approval of the Standard does not necessarily imply that all the committee members voted for its approval. At the time this standard was approved, the X9 committee
24、had the following members: X9 Chairman Roy DeCicco X9 Vice-Chairman Claudia Swendseid Executive Director- Steve Stevens Organization Represented Representative ACI Worldwide Doug Grote ACI Worldwide Dan Kinney American Bankers Association Diane Poole American Express Company David Moore Bank of Amer
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIASCX9X911912016RETAILFINANCIALSERVICESREQUIREMENTSFORPROTECTIONOFSENSITIVEPAYMENTCARDDATAPART1USINGENCRYPTIONMETHODSPDF

链接地址:http://www.mydoc123.com/p-431338.html