ANSI X9.24 Part 2-2006 Retail Financial Services Symmetric Key Management Part 2 Using Asymmetric Techniques for the Distribution of Symmetric Keys《零售金融业务对称密钥管理.第2部分 对称密钥分配用对称技术》.pdf
《ANSI X9.24 Part 2-2006 Retail Financial Services Symmetric Key Management Part 2 Using Asymmetric Techniques for the Distribution of Symmetric Keys《零售金融业务对称密钥管理.第2部分 对称密钥分配用对称技术》.pdf》由会员分享,可在线阅读,更多相关《ANSI X9.24 Part 2-2006 Retail Financial Services Symmetric Key Management Part 2 Using Asymmetric Techniques for the Distribution of Symmetric Keys《零售金融业务对称密钥管理.第2部分 对称密钥分配用对称技术》.pdf(36页珍藏版)》请在麦多课文档分享上搜索。
1、 American National Standard for Financial Services ANS X9.24 Part 2: 2006 Retail Financial Services Symmetric Key Management Part 2: Using Asymmetric Techniques for the Distribution of Symmetric Keys Secretariat Accredited Standards Committee X9, Inc. Approved: American National Standards Institute
2、Copyright American National Standards Institute Provided by IHS under license with ANSI Not for ResaleNo reproduction or networking permitted without license from IHS-,-,-Copyright American National Standards Institute Provided by IHS under license with ANSI Not for ResaleNo reproduction or networki
3、ng permitted without license from IHS-,-,-ANS X9.24 Part 2: 2006 Foreword Approval of an American National Standard requires verification by ANSI that the requirements for due process, consensus, and other criteria for approval have been met by the standards developer. Consensus is established when,
4、 in the judgment of the ANSI Board of Standards Review, substantial agreement has been reached by directly and materially affected interests. Substantial agreement means much more than a simple majority, but not necessarily unanimity. Consensus requires that all views and objections be considered, a
5、nd that a concerted effort be made toward their resolution. The use of American National Standards is completely voluntary; their existence does not in any respect preclude anyone, whether he has approved the standards or not from manufacturing, marketing, purchasing, or using products, processes, o
6、r procedures not conforming to the standards. The American National Standards Institute does not develop standards and will in no circumstances give an interpretation of any American National Standard. Moreover, no person shall have the right or authority to issue an interpretation of an American Na
7、tional Standard in the name of the American National Standards Institute. Requests for interpretation should be addressed to the secretariat or sponsor whose name appears on the title page of this standard. CAUTION NOTICE: This American National Standard may be revised or withdrawn at any time. The
8、procedures of the American National Standards Institute require that action be taken to reaffirm, revise, or withdraw this standard no later than five years from the date of approval. Published by Accredited Standards Committee X9, Incorporated Financial Industry Standards P.O. Box 4035 Annapolis, M
9、D 21403 USA X9 Online http:/www.X9.orgCopyright 2006 Accredited Standards Committee X9, Inc. All rights reserved. No part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without prior written permission of the publisher. Printed in the United States
10、 of America. 2006 All rights reservediCopyright American National Standards Institute Provided by IHS under license with ANSI Not for ResaleNo reproduction or networking permitted without license from IHS-,-,-ANS X9.24 Part 2: 2006 2006 All rights reserved iiContents Foreword i Figures iv Tables v I
11、ntroduction vi 1 Purpose 10 2 Scope10 2.1 Application .11 3 References .11 4 Terms and Definitions.12 5 Standard Organization18 6 Environment.18 6.1 General .18 6.2 Cardholder and Card Issuer .20 6.3 Card Acceptor20 6.4 Acquirer20 6.5 Tamper Resistant Security Module (TRSM)20 6.6 Acquirer Host.21 6.
12、7 Certification Authority.21 6.8 Device Manufacturer .21 7 Key Management Requirements21 7.1 General .21 7.1.1 Symmetric Keys.21 7.1.2 Asymmetric Keys 22 7.2 Tamper-Resistant Security Modules (TRSM) used for Key Management .23 7.3 A Secure Environment23 7.4 Certification Authority (CA) Requirements.
13、23 7.5 Key Generation 24 7.5.1 Symmetric Key Generation.24 7.5.2 Asymmetric Key Generation 24 7.6 Asymmetric Key Activation/Enablement 24 7.6.1 Creation of Certificates.24 7.6.2 Signing of Certificates 24 7.6.3 Lifetime of Certificates24 7.6.4 Authentication of Valid Request and Valid Device 25 7.7
14、Key Distribution.25 7.7.1 Symmetric Key Distribution/Loading 25 7.7.2 Asymmetric Key Distribution/Loading 25 7.8 Key Utilization26 7.8.1 Symmetric Key Utilization 26 7.8.2 Asymmetric Key Utilization 26 7.9 Key Storage26 7.10 Key Replacement.26 7.11 Key Destruction .27 Copyright American National Sta
15、ndards Institute Provided by IHS under license with ANSI Not for ResaleNo reproduction or networking permitted without license from IHS-,-,-ANS X9.24 Part 2: 2006 2006 All rights reserved iii8 Trust Models and Key Establishment Protocols27 8.1 Introduction27 8.2 Trust Models 28 8.2.1 Three-Party Mod
16、el CAs 28 8.2.2 Two-Party Model Self Signing Model .28 8.2.3 Prior Trust Model.29 8.3 Key Establishment Protocols.29 8.3.1 Unilateral Key Transport Method.29 8.3.2 Bilateral Key Transport Method (Both Entities Generate and Share Symmetric Key Joint Control).30 8.3.3 Key Agreement Method 32 Annex A (
17、Normative) Approved ANSI Symmetric Key Algorithms for Encryption of Private Keys 34 Copyright American National Standards Institute Provided by IHS under license with ANSI Not for ResaleNo reproduction or networking permitted without license from IHS-,-,-ANS X9.24 Part 2: 2006 iv 2006 All rights res
18、ervedFigures Figure 1 High Level Overview of Key Transport Method (Unilateral).29 Figure 2 High Level Overview of Key Transport Method (Bilateral).31 Figure 3 High Level Overview of Key Agreement Method .32 Copyright American National Standards Institute Provided by IHS under license with ANSI Not f
19、or ResaleNo reproduction or networking permitted without license from IHS-,-,-ANS X9.24 Part 2: 2006 2006 All rights reserved vTables Table 1 Trust Models and Key Establishment Protocols. 28 Copyright American National Standards Institute Provided by IHS under license with ANSI Not for ResaleNo repr
20、oduction or networking permitted without license from IHS-,-,-ANS X9.24 Part 2: 2006 vi 2006 All rights reservedIntroduction Today, billions of dollars in funds are transferred electronically by various communication methods. Transactions are often entered remotely, off-premise from financial instit
21、utions, by retailers or by customers directly. Such transactions are transmitted over potentially non-secure media. The vast range in value, size, and the volume of such transactions expose institutions to severe risks, which may be uninsurable. To protect these financial messages and other sensitiv
22、e information, many institutions are making increased use of the American National Standards Institute Triple Data Encryption Algorithm (TDEA). Specific examples of its use include standards for message authentication, personal identification number encryption, other data encryption, and key encrypt
23、ion. The TDEA is in the public domain. The security and reliability of any process based on the TDEA is directly dependent on the protection afforded to secret numbers called cryptographic keys. A familiar analogy may be found in the combination lock of a vault. The lock design is public knowledge.
24、Security is provided by keeping a number, the combination, a secret. Secure operation also depends on protective procedures and features which prevent surreptitious viewing or determination of the combination by listening to its operation. Procedures are also required to ensure that the combination
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIX924PART22006RETAILFINANCIALSERVICESSYMMETRICKEYMANAGEMENTPART2USINGASYMMETRICTECHNIQUESFORTHEDISTRIBUTIONOFSYMMETRICKEYS

链接地址:http://www.mydoc123.com/p-439642.html