ANSI ASC X9 X9.24-1-2017 Retail Financial Services Symmetric Key Management Part 1 Using Symmetric Techniques.pdf
《ANSI ASC X9 X9.24-1-2017 Retail Financial Services Symmetric Key Management Part 1 Using Symmetric Techniques.pdf》由会员分享,可在线阅读,更多相关《ANSI ASC X9 X9.24-1-2017 Retail Financial Services Symmetric Key Management Part 1 Using Symmetric Techniques.pdf(48页珍藏版)》请在麦多课文档分享上搜索。
1、 American National Standard for Financial Services ANSI X9.24-1-2017 Retail Financial Services Symmetric Key Management Part 1: Using Symmetric Techniques Accredited Standards Committee X9, Incorporated Financial Industry Standards Date Approved: June 8, 2017 American National Standards Institute Am
2、erican National Standards, Technical Reports and Guides developed through the Accredited Standards Committee X9, Inc., are copyrighted. Copying these documents for personal or commercial use outside X9 membership agreements is prohibited without express written permission of the Accredited Standards
3、 Committee X9, Inc. For additional information please contact ASC X9, Inc., 275 West Street, Suite 107, Annapolis, MD 21401. This page left intentionally blank ANSI X9.24-1-2017 2017 ASC X9, Inc. All rights reserved i Contents Figures iii Tables . iv Foreword . v Introduction vi 1 Purpose 12 2 Scope
4、 12 2.1 General . 12 2.2 Application . 12 3 References . 13 4 Terms and Definitions . 14 5 Standard Organization 21 6 Payment Environment . 22 6.1 General . 22 6.2 Cardholder and Card Issuer . 22 6.3 Card Acceptor 22 6.4 Acquirer 22 6.5 Switch . 22 7 Key Management Requirements 23 7.1 General . 23 7
5、.1.1 Dual Control and Split Knowledge . 23 7.1.2 Permissible Key Forms . 23 7.1.3 Logging . 24 7.1.4 Key Strength 24 7.1.5 Key Locations 24 7.1.6 Production Key Usage 24 7.1.7 Single Purpose Key Use . 24 7.2 Secure Cryptographic Device (SCD) . 25 7.3 Environments . 26 7.3.1 Minimally Controlled Envi
6、ronment 26 7.3.2 Controlled Environment 26 7.3.3 Secure Environment 26 7.4 Key Blocks . 26 7.4.1 Overview of key blocks . 26 7.4.2 Key attributes . 27 7.4.3 Integrity of the key block 27 7.4.4 Key and Sensitive Attributes Field 28 7.5 Key Creation . 28 7.5.1 Random Key Generation . 28 7.5.2 Key Deri
7、vation 28 7.5.3 Key Calculation (Variants) 29 7.6 Key Component and Key Share Creation . 29 7.7 Check Values . 29 7.7.1 Introduction 29 7.7.2 Check Value Calculation . 30 7.8 Key Distribution . 30 7.8.1 Introduction 30 ANSI X9.24-1-2017 ii 2017 ASC X9, Inc. All rights reserved 7.8.2 Personal Conveya
8、nce of Cleartext Components or Shares 30 7.8.3 Transporting Cleartext Components or Shares . 30 7.8.4 Transporting Cleartext Keys Using a Portable Key Loading Device 31 7.9 Key Loading . 33 7.9.1 General 33 7.9.2 Loading Key Components or Shares . 33 7.9.3 Cleartext Key Loading . 34 7.10 Key Utiliza
9、tion 35 7.11 Cleartext Key Component and Share Storage 36 7.12 Key Replacement . 36 7.13 Key Destruction . 37 7.13.1 General 37 7.13.2 Key Destruction from an SCD 37 7.13.3 Destruction of a Key in Cryptogram Form 37 7.13.4 Component and Share Destruction . 37 7.14 Key Archiving . 37 7.15 Key Comprom
10、ise . 38 8 Symmetric Key Management Specifications 39 8.1 General 39 8.2 Method: Fixed Keys . 39 8.3 Method: Master Keys / Session Keys 39 Annex A (Normative) Key and Component Check Values 40 Annex B (Normative) Split Knowledge During Transport . 43 ANSI X9.24-1-2017 2017 ASC X9, Inc. All rights re
11、served iii Figures Figure 1 Example of XOR Function to Combine Key Components . 26 Figure 2 Key Block Overview Example 27 Figure 3 Legacy Generation of Key Check Value 40 Figure 4 CMAC Generation of Key Check Value . 41 ANSI X9.24-1-2017 iv 2017 ASC X9, Inc. All rights reserved Tables Table 1 Comple
12、te Hex Values for Rb 42 ANSI X9.24-1-2017 2017 ASC X9, Inc. All rights reserved v Foreword Approval of an American National Standard requires verification by ANSI that the requirements for due process, consensus, and other criteria for approval have been met by the standards developer. Consensus is
13、established when, in the judgment of the ANSI Board of Standards Review, substantial agreement has been reached by directly and materially affected interests. Substantial agreement means much more than a simple majority, but not necessarily unanimity. Consensus requires that all views and objections
14、 be considered, and that a concerted effort be made toward their resolution. The use of American National Standards is completely voluntary; their existence does not in any respect preclude anyone, whether he has approved the standards or not from manufacturing, marketing, purchasing, or using produ
15、cts, processes, or procedures not conforming to the standards. The American National Standards Institute does not develop standards and will in no circumstances give an interpretation of any American National Standard. Moreover, no person shall have the right or authority to issue an interpretation
16、of an American National Standard in the name of the American National Standards Institute. Requests for interpretation should be addressed to the secretariat or sponsor whose name appears on the title page of this standard. CAUTION NOTICE: This American National Standard may be revised or withdrawn
17、at any time. The procedures of the American National Standards Institute require that action be taken to reaffirm, revise, or withdraw this standard no later than five years from the date of approval. Published by Accredited Standards Committee X9, Incorporated Financial Industry Standards 275 West
18、Street, Suite 107 Annapolis, MD 21401 USA X9 Online http:/www.x9.org Copyright 2017 Accredited Standards Committee X9, Inc. All rights reserved. No part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without prior written permission of the publishe
19、r. Printed in the United States of America. ANSI X9.24-1-2017 vi 2017 ASC X9, Inc. All rights reserved Introduction The users attention is called to the possibility that compliance with this standard may require use of an invention covered by patent rights. By publication of this standard, no positi
20、on is taken with respect to the validity of this claim or of any patent rights in connection therewith. The patent holder has, however, filed a statement of willingness to grant a license under these rights on reasonable and nondiscriminatory terms and conditions to applicants desiring to obtain suc
21、h a license. Details may be obtained from the standards developer. Today, billions of dollars in funds are transferred electronically by various communication methods. Transactions are often entered remotely, off-premise from financial institutions, by retailers or by customers directly. Such transa
22、ctions are transmitted over potentially non-secure media. The vast range in value, size, and the volume of such transactions expose institutions to severe risks, which may be uninsurable. To protect these financial messages and other sensitive information, many institutions are making increased use
23、of the American National Standards Institute Triple Data Encryption Algorithm (TDEA) and the Advanced Encryption Standard (AES). Specific examples of its use include standards for message authentication, personal identification number encryption, other data encryption, and key encryption. AES and th
24、e TDEA are in the public domain. The security and reliability of any process based on AES or the TDEA is directly dependent on the protection afforded to secrets called cryptographic keys. This part of this standard deals exclusively with management of symmetric keys using symmetric techniques. ANS
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIASCX9X92412017RETAILFINANCIALSERVICESSYMMETRICKEYMANAGEMENTPART1USINGSYMMETRICTECHNIQUESPDF

链接地址:http://www.mydoc123.com/p-431343.html