ANSI ASC X9 X9.69-2017 Framework for Key Management Extensions.pdf
《ANSI ASC X9 X9.69-2017 Framework for Key Management Extensions.pdf》由会员分享,可在线阅读,更多相关《ANSI ASC X9 X9.69-2017 Framework for Key Management Extensions.pdf(29页珍藏版)》请在麦多课文档分享上搜索。
1、 ASC X9, Inc. 2017 All rights reserved American National Standard for Financial Services ANSI X9.692017 Framework for Key Management Extensions Developed by Accredited Standards Committee X9, Incorporated Financial Industry Standards Date Approved: September 19, 2017 American National Standards Inst
2、itute American National Standards, Technical Reports and Guides developed through the Accredited Standards Committee X9, Inc., are copyrighted. Copying these documents for personal or commercial use outside X9 membership agreements is prohibited without express written permission of the Accredited S
3、tandards Committee X9, Inc. For additional information please contact ASC X9, Inc., 275 West Street, Suite 107, Annapolis, MD 21401. ANSI X9.692017 2 ASC X9, Inc. 2017 All rights reserved Contents Page Forword . 4 Introduction . 5 1 Scope 14 2 Normative references 14 3 Terms, symbols and abbreviated
4、 terms 15 4 Application . 15 4.1 General . 17 4.2 The Use of Constructive Key Management 17 4.3 The Use of Key Usage Control Vector . 17 4.4 System Algorithm and System Key . 17 5 Constructive Key Management 17 5.1 Overview . 17 5.2 CKM Administration 19 5.2.1 Credentials . 19 5.2.2 Splits . 19 5.3
5、Token Distribution . 20 5.3.1 Workstation 20 5.3.2 Token 20 5.4 Key Creation. 20 5.4.1 Key Component Selection 21 5.4.2 Key Combiner 21 5.4.3 Key Reconstruction . 21 6 Key Usage Control 22 6.1 Overview . 22 6.2 Key Binding Methods 23 6.2.1 Binding Method 1 23 6.2.2 Binding Method 2 23 6.2.3 Binding
6、Method 3 24 6.2.4 Binding Method 4 24 6.2.5 Binding Method 5 24 6.2.6 Binding Method 6 25 Annex A (informative) Example Key Usage Vector Formats 26 A.1 General . 26 A.2 Examples 26 Bibliography 29 ANSI X9.692017 ASC X9, Inc. 2017 All rights reserved 3 Figures Figure 1 - Token Distribution . 18 Figur
7、e 2 - Combiner Function 21 Figure 3 - Key Usage Vector Fields . 23 ANSI X9.692017 4 ASC X9, Inc. 2017 All rights reserved Foreword Approval of an American National Standard requires verification by ANSI that the requirements for due process, consensus, and other criteria for approval have been met b
8、y the standards developer. Consensus is established when, in the judgment of the ANSI Board of Standards Review, substantial agreement has been reached by directly and materially affected interests. Substantial agreement means much more than a simple majority, but not necessarily unanimity. Consensu
9、s requires that all views and objections be considered, and that a concerted effort be made toward their resolution. The use of American National Standards is completely voluntary; their existence does not in any respect preclude anyone, whether he has approved the standards or not from manufacturin
10、g, marketing, purchasing, or using products, processes, or procedures not conforming to the standards. The American National Standards Institute does not develop standards and will in no circumstances give an interpretation of any American National Standard. Moreover, no person shall have the right
11、or authority to issue an interpretation of an American National Standard in the name of the American National Standards Institute. Requests for interpretation should be addressed to the secretariat or sponsor whose name appears on the title page of this standard. CAUTION NOTICE: This American Nation
12、al Standard may be revised or withdrawn at any time. The procedures of the American National Standards Institute require that action be taken to reaffirm, revise, or withdraw this standard no later than five years from the date of approval. Published by Accredited Standards Committee X9, Incorporate
13、d Financial Industry Standards 275 West Street, Suite 107 Annapolis, MD 21401 USA X9 Online http:/www.x9.org Copyright 2017 ASC X9, Inc. All rights reserved. No part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without prior written permission of
14、 the publisher. Published in the United States of America. ANSI X9.692017 ASC X9, Inc. 2017 All rights reserved 5 Introduction This Standard is concerned with symmetric key systems in which the encrypting key and decrypting key are identical. The security and reliability of any process based on a sy
15、mmetric cryptographic algorithm is directly dependent on the protection afforded to the secret quantity, called the key. Thus, no matter how strong the algorithm, the system is only as secure as its key management method. This Standard defines two specific key management methods for controlling and
16、handling keys, called (1) Constructive Key Management and (2) Key Usage Control. Each method can be used independently; or the methods can be used in combination. However, the combined use of the methods is highly recommended by the ASC X9 Subcommittee responsible for this Standard. Each method is d
17、escribed in a separate section of the Standard. The section on CONSTRUCTIVE KEY MANAGEMENT, systematizes key creation, implementing “dual control” or “split knowledge” by using key components to construct the final working key. This working key may be used in several ways including as a session key,
18、 for a store-and-forward (i.e. e-mail) application, and for file encryption applications, such as archiving, or protecting filed information until needed again by the user. Other applications are also possible. Until now, this practice of split knowledge key creation has been used mainly to transpor
19、t key parts into systems where “master keys” were used to protect keys in storage, and to recover the working keys for a current application. With the methodology of this Standard, a working key will be created as needed for a specific encryption process, and re-created when needed to decrypt the ob
20、ject. Depending on the application, the key may be saved or destroyed after each use. The working key is never transmitted; the application program only knows it while it is in use. The section on KEY USAGE CONTROL, allows the creator of a key to specify the allowed uses of the key. For example, key
21、 usage control information can be used to distinguish key types (data, PIN, or key-encrypting). The type “data key” can be further sub-divided to distinguish data privacy keyskeys used to encrypt and decrypt datafrom Message Authentication Code (MAC) keys -keys used to protect the integrity of data.
22、 The method attaches or binds a “key usage vector” to each generated key, for the life of the key, and is used by the system to ensure that keys are used properly. In short, the key usage vector prevents abuses and attacks against the key. The key usage vector can be used to protect keys stored with
23、in a single system, or to protect keys transmitted from one system to another. This Standard is algorithm independent, and as new cryptographic algorithms with perhaps longer key lengths than currently in use are developed and adopted by the Financial Community this Standard will still apply. This s
24、tandard includes a Constructive Key Management working key for a symmetric encryption capability. Studies are surfacing that asymmetrical key can be subject to Quantum Computing attack.1 NOTE The users attention is called to the possibility that compliance with this standard may require use of an in
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIASCX9X9692017FRAMEWORKFORKEYMANAGEMENTEXTENSIONSPDF

链接地址:http://www.mydoc123.com/p-431352.html