ANSI ASC X9 X9.63-2001 Public Key Cryptography for the Financial Services Industry Key Agreement and Key Transport Using Elliptic Curve Cryptography.pdf
《ANSI ASC X9 X9.63-2001 Public Key Cryptography for the Financial Services Industry Key Agreement and Key Transport Using Elliptic Curve Cryptography.pdf》由会员分享,可在线阅读,更多相关《ANSI ASC X9 X9.63-2001 Public Key Cryptography for the Financial Services Industry Key Agreement and Key Transport Using Elliptic Curve Cryptography.pdf(415页珍藏版)》请在麦多课文档分享上搜索。
1、American National Standardfor Financial ServicesX9.632001Public Key Cryptography for the Financial ServicesIndustryKey Agreement and Key Transport Using EllipticCurve CryptographySecretariat:Accredited Standards Committee X9, Inc.Approved: November 20, 2001American National Standards Institute 2001
2、American Bankers Association ANSI X9.63-2001- i -ForewordBusiness practice has changed with the introduction of computer-based technologies. Thesubstitution of electronic transactions for their paper-based predecessors has reduced costs andimproved efficiency. Trillions of dollars in funds and secur
3、ities are transferred daily bytelephone, wire services, and other electronic communication mechanisms. The high value orsheer volume of such transactions within an open environment exposes the financial communityand its customers to potentially severe risks from the accidental or deliberate disclosu
4、re,alteration, substitution, or destruction of data. These risks are compounded by interconnectednetworks, and the increased number and sophistication of malicious adversaries. Electronicallycommunicated data may be secured through the use of symmetrically keyed encryptionalgorithms (e.g. ANSI X9.52
5、, Triple-DEA) in combination with public-key cryptography-basedkey management techniques.This standard, X9.63-2001, Public Key Cryptography For The Financial Services Industry: KeyAgreement and Key Transport Using Elliptic Curve Cryptography, defines a suite ofmechanisms designed to facilitate the s
6、ecure establishment of cryptographic data for the keyingof symmetrically keyed algorithms (e.g. DEA, TDEA). These mechanisms are based on theelliptic curve analogue of the Diffie-Hellman key agreement mechanism 4. Because themechanisms are based on the same fundamental mathematics as the Elliptic Cu
7、rve DigitalSignature Algorithm (ECDSA) (see 7), additional efficiencies and functionality may beobtained by combining these and other cryptographic techniques.While the techniques specified in this standard are designed to facilitate key managementapplications, the standard does not guarantee that a
8、 particular implementation is secure. It is theresponsibility of the financial institution to put an overall process in place with the necessarycontrols to ensure that the process is securely implemented. Furthermore, the controls shouldinclude the application of appropriate audit tests in order to
9、verify compliance.The users attention is called to the possibility that compliance with this standard may require theuse of an invention covered by patent rights. By publication of this standard, no position is takenwith respect to the validity of potential claims or of any patent rights in connecti
10、on therewith.The patent holders have, however, filed a statement of willingness to grant a license under theserights on reasonable and nondiscriminatory terms and conditions to applicants desiring to obtainsuch a license. Details may be obtained from the X9 Secretariat,Copyright 2001 by Accredited S
11、tandards Committee X9, Inc.All rights reserved.No part of this publication may be reproduced in any form, in an electronic retrieval system orotherwise, without prior written permission of the publisher. Printed in the United States ofAmerica 2001 American Bankers Association ANSI X9.63-2001- ii -Su
12、ggestions for the improvement or revision of this standard are welcome. They should be sentto Accredited Standards Committee X9, Inc., P.O. Box 4035, Annapolis, Maryland, 21403USA.This standard was processed and approved for submittal to ANSI by the Accredited StandardsCommittee on Financial Service
13、s, X9. Committee approval of the standard does not necessarilyimply that all the committee members voted for its approval.At the time that this standard was approved, the X9 Committee had the following members:Harold G. Deal, X9 Chairman, BB the twokeys have the property that, given the public key,
14、it is computationally infeasible to derive theprivate key.2001 ASC X9, Inc. ANSI X9.63-2001 2001 American Bankers Association ANSI X9.63-2001- 2 -auxiliary functionAn auxiliary function is a transformation that forms part of a cryptographic scheme but isauxiliary rather than central to the goal of t
15、he scheme.base point (G)A selected point on an elliptic curve of large prime order n.basisA representation of the elements of the finite field F2m. Two special kinds of basis are polynomialbasis and normal basis. (See Annex B.2.)binary polynomialA polynomial whose coefficients are in the field F2. W
16、hen adding, multiplying, or dividing twobinary polynomials, the coefficient arithmetic is performed modulo 2.bit stringA bit string is an ordered sequence of 0s and 1s.certificateThe public key and identity of an entity together with some other information, that is renderedunforgeable by signing the
17、 certificate with the private key of the Certification Authority whichissued that certificate. In this Standard, the term certificate will mean a public-key certificate.Certification Authority (CA)A Center trusted by one or more entities to create and assign certificates.challengeData sent from enti
18、ty U to entity V during an execution of a protocol that, in part, determines Vsresponse. In this Standard, challenges will be bit strings at least 80 bits in length.characteristic of a finite fieldIf a finite field has 2melements, its characteristic is 2. If a finite field has p elements, where p is
19、prime, its characteristic is p.characteristic 2 finite fieldA finite field containing 2melements, where m 1 is an integer. In this Standard, onlycharacteristic 2 fields containing 2melements with m prime are used.cofactorThe integer h = #E(Fq)/n, where #E(Fq) is the order of the elliptic curve E, an
20、d n is the order ofthe base pressed formOctet string representation for an elliptic curve point using the point compression techniquedescribed in Section 4.2. (See also Section 4.3.6.)cryptographic hash functionA (mathematical) function which maps values from a large (possibly very large) domain int
21、o asmaller range. The function satisfies the following properties:1. (one-way) it is computationally infeasible to find any input that maps to any pre-specifiedoutput;2001 ASC X9, Inc. ANSI X9.63-2001 2001 American Bankers Association ANSI X9.63-2001- 3 -2. (collision free) it is computationally inf
22、easible to find any two distinct inputs that map tothe same output.cryptographic key (key)A parameter that determines the operation of a cryptographic function such as:1. the transformation from plaintext to ciphertext and vice versa,2. the synchronized generation of keying material,3. a digital sig
23、nature computation or verification.cryptographic protocolA cryptographic scheme in which an ordered sequence of sets of data is passed between twoentities during an ordinary operation of the scheme.cryptographic schemeA cryptographic scheme consists of an unambiguous specification of a set of transf
24、ormations thatare capable of providing a cryptographic service when properly implemented and maintained.cryptographyThe discipline that embodies principles, means and methods for the transformation of data inorder to hide its information content, prevent its undetected modification, prevent itsunaut
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIASCX9X9632001PUBLICKEYCRYPTOGRAPHYFORTHEFINANCIALSERVICESINDUSTRYKEYAGREEMENTANDKEYTRANSPORTUSINGELLIPTICCURVECRYPTOGRAPHYPDF

链接地址:http://www.mydoc123.com/p-431350.html