ANSI X9.24 PART 2-2016 Retail Financial Services Symmetric Key Management Part 2 Using Asymmetric Techniques for the Distribution of Symmetric Keys.pdf
《ANSI X9.24 PART 2-2016 Retail Financial Services Symmetric Key Management Part 2 Using Asymmetric Techniques for the Distribution of Symmetric Keys.pdf》由会员分享,可在线阅读,更多相关《ANSI X9.24 PART 2-2016 Retail Financial Services Symmetric Key Management Part 2 Using Asymmetric Techniques for the Distribution of Symmetric Keys.pdf(46页珍藏版)》请在麦多课文档分享上搜索。
1、 American National Standard for Financial Services ANS X9.24 Part 2: 2016 Retail Financial Services Symmetric Key Management Part 2: Using Asymmetric Techniques for the Distribution of Symmetric Keys Secretariat Accredited Standards Committee X9, Incorporated Financial Industry Standards Date Approv
2、ed: November 25, 2016 American National Standards Institute American National Standards, Technical Reports and Guides developed through the Accredited Standards Committee X9, Inc., are copyrighted. Copying these documents for personal or commercial use outside X9 membership agreements is prohibited
3、without express written permission of the Accredited Standards Committee X9, Inc. For additional information please contact ASC X9, Inc., 275 West Street, Suite 107, Annapolis, MD 21401. ANS X9.24 Part 2: 2016 2016 All rights reserved i Foreword Approval of an American National Standard requires ver
4、ification by ANSI that the requirements for due process, consensus, and other criteria for approval have been met by the standards developer. Consensus is established when, in the judgment of the ANSI Board of Standards Review, substantial agreement has been reached by directly and materially affect
5、ed interests. Substantial agreement means much more than a simple majority, but not necessarily unanimity. Consensus requires that all views and objections be considered, and that a concerted effort be made toward their resolution. The use of American National Standards is completely voluntary; thei
6、r existence does not in any respect preclude anyone, whether he has approved the standards or not from manufacturing, marketing, purchasing, or using products, processes, or procedures not conforming to the standards. The American National Standards Institute does not develop standards and will in n
7、o circumstances give an interpretation of any American National Standard. Moreover, no person shall have the right or authority to issue an interpretation of an American National Standard in the name of the American National Standards Institute. Requests for interpretation should be addressed to the
8、 secretariat or sponsor whose name appears on the title page of this standard. CAUTION NOTICE: This American National Standard may be revised or withdrawn at any time. The procedures of the American National Standards Institute require that action be taken to reaffirm, revise, or withdraw this stand
9、ard no later than five years from the date of approval. Published by Accredited Standards Committee X9, Incorporated Financial Industry Standards 275 West Street, Suite 107 Annapolis, MD 21403 USA X9 Online http:/www.x9.org Copyright 2016 Accredited Standards Committee X9, Inc. All rights reserved.
10、No part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without prior written permission of the publisher. Printed in the United States of America. ANS X9.24 Part 2: 2016 2016 All rights reserved ii Contents Foreword i Figures iv Tables v Introducti
11、on vi 1 Purpose 13 2 Scope 14 2.1 Application . 14 3 References . 14 4 Terms and Definitions . 15 5 Standard Organization 21 6 Environment . 22 6.1 General . 22 6.2 Cardholder and Card Issuer . 23 6.3 Card Acceptor 24 6.4 Acquirer 24 6.5 Secure Cryptographic Device (SCD) . 24 6.6 Acquirer Host . 25
12、6.7 Certification Authority . 25 6.8 Device Manufacturer . 25 7 Key Management Requirements 25 7.1 General . 25 7.1.1 Symmetric Keys . 25 7.1.2 Asymmetric Keys . 26 7.2 Secure Cryptographic Devices (SCD) used for Key Management . 27 7.3 A Secure Environment 27 7.4 Certification Authority (CA) Requir
13、ements . 27 7.5 Registration Authority (RA) Requirements . 28 7.6 Key Generation 29 7.6.1 Symmetric Key Generation . 29 7.6.2 Asymmetric Key Generation . 29 7.7 Asymmetric Key Activation/Enablement . 29 7.7.1 Creation of Certificates . 29 7.7.2 Signing of Certificates 30 7.7.3 Lifetime of Certificat
14、es 30 7.7.4 Authentication of Valid Request and Valid Device . 30 7.8 Key Distribution . 30 7.8.1 Symmetric Key Distribution 30 7.8.2 Asymmetric Key Distribution . 31 7.9 Key Utilization 32 7.9.1 Symmetric Key Utilization . 32 7.9.2 Asymmetric Key Utilization 32 7.10 Key Storage 33 7.11 Key Replacem
15、ent . 33 ANS X9.24 Part 2: 2016 2016 All rights reserved iii 7.12 Key Destruction . 33 8 Trust Models and Key Establishment Protocols 34 8.1 Introduction 34 8.2 Trust Models 34 8.2.1 Three-Party Model Third Party CA 34 8.2.2 Two-Party Model One Party Acts as CA . 35 8.2.3 Prior Trust Model No CA 38
16、8.3 Symmetric Key Establishment Protocols 38 8.3.1 Unilateral Key Transport Method . 38 8.3.2 Bilateral Key Transport Method (Both Parties Generate and Share Symmetric Key Joint Control) . 39 8.3.3 Key Agreement Method . 41 Annex A (Normative) Approved ANSI Symmetric Key Algorithms for Encryption of
17、 Private Keys 44 ANS X9.24 Part 2: 2016 iv 2016 All rights reserved Figures Figure 1, Example of Hierarchical Trust Domain/Sub-Domains 23 Figure 2 Three Party Example: Key Distribution to KRDs 35 Figure 3 Two Party Example: Key distribution to KRDs; manufacturer of KRDs plays role of CA . 36 Figure
18、4 Two Party Example: Key distribution to KRDs; KDH plays role of CA 37 Figure 5 Two Party Example: Key distribution between interchange nodes . 37 Figure 6 High Level Overview of Key Transport Method (Unilateral) . 38 Figure 7 High Level Overview of Key Transport Method (Bilateral) 40 Figure 8 High
19、Level Overview of Key Agreement Method 41 ANS X9.24 Part 2: 2016 2016 All rights reserved v Tables Table 1 Trust Models and Key Establishment Protocols . 34 ANS X9.24 Part 2: 2016 vi 2016 All rights reserved Introduction Today, billions of dollars in funds are transferred electronically by various c
20、ommunication methods. Transactions are often entered remotely, off-premise from financial institutions, by retailers or by customers directly. Such transactions are transmitted over potentially non-secure media. The vast range in value, size, and the volume of such transactions expose institutions t
21、o severe risks, which may be uninsurable. To protect these financial messages and other sensitive information, many institutions are making use of the American National Standards Institute Triple Data Encryption Algorithm (TDEA), or the algorithm defined in the Advanced Encryption Standard (AES). Sp
22、ecific examples of TDEA use include standards for message authentication, personal identification number encryption, other data encryption, and key encryption. The TDEA and AES are in the public domain. The security and reliability of any process based on these algorithms is directly dependent on th
23、e protection afforded to secret numbers called cryptographic keys. A familiar analogy may be found in the combination lock of a vault. The lock design is public knowledge. Security is provided by keeping a number, the combination, a secret. Secure operation also depends on protective procedures and
24、features which prevent surreptitious viewing or determination of the combination by listening to its operation. Procedures are also required to ensure that the combination is random and cannot be modified by an unauthorized individual without detection. Part 1 of ANS X9.24 deals exclusively with man
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIX924PART22016RETAILFINANCIALSERVICESSYMMETRICKEYMANAGEMENTPART2USINGASYMMETRICTECHNIQUESFORTHEDISTRIBUTIONOFSYMMETRICKEYSPDF

链接地址:http://www.mydoc123.com/p-439643.html