ImageVerifierCode 换一换
格式:PDF , 页数:415 ,大小:1.33MB ,
资源ID:431350      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-431350.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ANSI ASC X9 X9.63-2001 Public Key Cryptography for the Financial Services Industry Key Agreement and Key Transport Using Elliptic Curve Cryptography.pdf)为本站会员(sumcourage256)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ANSI ASC X9 X9.63-2001 Public Key Cryptography for the Financial Services Industry Key Agreement and Key Transport Using Elliptic Curve Cryptography.pdf

1、American National Standardfor Financial ServicesX9.632001Public Key Cryptography for the Financial ServicesIndustryKey Agreement and Key Transport Using EllipticCurve CryptographySecretariat:Accredited Standards Committee X9, Inc.Approved: November 20, 2001American National Standards Institute 2001

2、American Bankers Association ANSI X9.63-2001- i -ForewordBusiness practice has changed with the introduction of computer-based technologies. Thesubstitution of electronic transactions for their paper-based predecessors has reduced costs andimproved efficiency. Trillions of dollars in funds and secur

3、ities are transferred daily bytelephone, wire services, and other electronic communication mechanisms. The high value orsheer volume of such transactions within an open environment exposes the financial communityand its customers to potentially severe risks from the accidental or deliberate disclosu

4、re,alteration, substitution, or destruction of data. These risks are compounded by interconnectednetworks, and the increased number and sophistication of malicious adversaries. Electronicallycommunicated data may be secured through the use of symmetrically keyed encryptionalgorithms (e.g. ANSI X9.52

5、, Triple-DEA) in combination with public-key cryptography-basedkey management techniques.This standard, X9.63-2001, Public Key Cryptography For The Financial Services Industry: KeyAgreement and Key Transport Using Elliptic Curve Cryptography, defines a suite ofmechanisms designed to facilitate the s

6、ecure establishment of cryptographic data for the keyingof symmetrically keyed algorithms (e.g. DEA, TDEA). These mechanisms are based on theelliptic curve analogue of the Diffie-Hellman key agreement mechanism 4. Because themechanisms are based on the same fundamental mathematics as the Elliptic Cu

7、rve DigitalSignature Algorithm (ECDSA) (see 7), additional efficiencies and functionality may beobtained by combining these and other cryptographic techniques.While the techniques specified in this standard are designed to facilitate key managementapplications, the standard does not guarantee that a

8、 particular implementation is secure. It is theresponsibility of the financial institution to put an overall process in place with the necessarycontrols to ensure that the process is securely implemented. Furthermore, the controls shouldinclude the application of appropriate audit tests in order to

9、verify compliance.The users attention is called to the possibility that compliance with this standard may require theuse of an invention covered by patent rights. By publication of this standard, no position is takenwith respect to the validity of potential claims or of any patent rights in connecti

10、on therewith.The patent holders have, however, filed a statement of willingness to grant a license under theserights on reasonable and nondiscriminatory terms and conditions to applicants desiring to obtainsuch a license. Details may be obtained from the X9 Secretariat,Copyright 2001 by Accredited S

11、tandards Committee X9, Inc.All rights reserved.No part of this publication may be reproduced in any form, in an electronic retrieval system orotherwise, without prior written permission of the publisher. Printed in the United States ofAmerica 2001 American Bankers Association ANSI X9.63-2001- ii -Su

12、ggestions for the improvement or revision of this standard are welcome. They should be sentto Accredited Standards Committee X9, Inc., P.O. Box 4035, Annapolis, Maryland, 21403USA.This standard was processed and approved for submittal to ANSI by the Accredited StandardsCommittee on Financial Service

13、s, X9. Committee approval of the standard does not necessarilyimply that all the committee members voted for its approval.At the time that this standard was approved, the X9 Committee had the following members:Harold G. Deal, X9 Chairman, BB the twokeys have the property that, given the public key,

14、it is computationally infeasible to derive theprivate key.2001 ASC X9, Inc. ANSI X9.63-2001 2001 American Bankers Association ANSI X9.63-2001- 2 -auxiliary functionAn auxiliary function is a transformation that forms part of a cryptographic scheme but isauxiliary rather than central to the goal of t

15、he scheme.base point (G)A selected point on an elliptic curve of large prime order n.basisA representation of the elements of the finite field F2m. Two special kinds of basis are polynomialbasis and normal basis. (See Annex B.2.)binary polynomialA polynomial whose coefficients are in the field F2. W

16、hen adding, multiplying, or dividing twobinary polynomials, the coefficient arithmetic is performed modulo 2.bit stringA bit string is an ordered sequence of 0s and 1s.certificateThe public key and identity of an entity together with some other information, that is renderedunforgeable by signing the

17、 certificate with the private key of the Certification Authority whichissued that certificate. In this Standard, the term certificate will mean a public-key certificate.Certification Authority (CA)A Center trusted by one or more entities to create and assign certificates.challengeData sent from enti

18、ty U to entity V during an execution of a protocol that, in part, determines Vsresponse. In this Standard, challenges will be bit strings at least 80 bits in length.characteristic of a finite fieldIf a finite field has 2melements, its characteristic is 2. If a finite field has p elements, where p is

19、prime, its characteristic is p.characteristic 2 finite fieldA finite field containing 2melements, where m 1 is an integer. In this Standard, onlycharacteristic 2 fields containing 2melements with m prime are used.cofactorThe integer h = #E(Fq)/n, where #E(Fq) is the order of the elliptic curve E, an

20、d n is the order ofthe base pressed formOctet string representation for an elliptic curve point using the point compression techniquedescribed in Section 4.2. (See also Section 4.3.6.)cryptographic hash functionA (mathematical) function which maps values from a large (possibly very large) domain int

21、o asmaller range. The function satisfies the following properties:1. (one-way) it is computationally infeasible to find any input that maps to any pre-specifiedoutput;2001 ASC X9, Inc. ANSI X9.63-2001 2001 American Bankers Association ANSI X9.63-2001- 3 -2. (collision free) it is computationally inf

22、easible to find any two distinct inputs that map tothe same output.cryptographic key (key)A parameter that determines the operation of a cryptographic function such as:1. the transformation from plaintext to ciphertext and vice versa,2. the synchronized generation of keying material,3. a digital sig

23、nature computation or verification.cryptographic protocolA cryptographic scheme in which an ordered sequence of sets of data is passed between twoentities during an ordinary operation of the scheme.cryptographic schemeA cryptographic scheme consists of an unambiguous specification of a set of transf

24、ormations thatare capable of providing a cryptographic service when properly implemented and maintained.cryptographyThe discipline that embodies principles, means and methods for the transformation of data inorder to hide its information content, prevent its undetected modification, prevent itsunaut

25、horized use, or a combination thereof.cryptoperiodThe time span during which a specific key is authorized for use or in which the keys for a givensystem may remain in effect.cyclic groupThe group of points E(Fq) is said to be cyclic if there exists a point PE(Fq) of order n, where n= #E(Fq). In this

26、 case, E(Fq) = kP: 0 k n-1, i.e. E(Fq) can be expressed as the set of allscalar multiples of P.data confidentialityThe assurance provided to entity U that data is unintelligible to entities other than U and V.data integrityThe assurance provided to entity U that data has not been modified by entitie

27、s other than U andV.data origin authenticationThe assurance provided to entity U that data is from V.digital signatureThe result of a cryptographic transformation of data that, when properly implemented, providesthe services of:1. origin authentication,2. data integrity, and2001 ASC X9, Inc. ANSI X9

28、.63-2001 2001 American Bankers Association ANSI X9.63-2001- 4 -3. signer non-repudiation.ECElliptic curve.ECDLPElliptic Curve Discrete Logarithm Problem. (See Annex H.)ECDSAElliptic Curve Digital Signature Algorithm.elliptic curveAn elliptic curve over Fqis a set of points that satisfy a certain equ

29、ation specified by twoparameters a and b, which are elements of the field Fq. (See Section 4.2.)elliptic curve key pair (Q, d)Given particular elliptic curve domain parameters, an elliptic curve key pair consists of anelliptic curve public key (Q) and the corresponding elliptic curve private key (d)

30、.elliptic curve private key (d)Given particular elliptic curve domain parameters, an elliptic curve private key, d, is astatistically unique and unpredictable integer in the interval 1, n-1, where n is the prime orderof the base point G.elliptic curve public key (Q)Given particular elliptic curve do

31、main parameters, and an elliptic curve private key d, thecorresponding elliptic curve public key, Q, is the elliptic curve point Q = dG, where G is the basepoint. Note that Q will never equal O, since 1 d n-1.elliptic curve domain parametersElliptic curve domain parameters are comprised of a field s

32、ize q, an indication FR of the basisused (in the case q = 2m), an optional SEED, two elements a, b in Fqthat define an elliptic curveE over Fq, a point G = (xG,yG) of prime order in E(Fq), the order n of G, and the cofactor h.See Sections 5.1.1.1 and 5.1.2.1 for a complete specification of elliptic

33、curve domain parameters.elliptic curve pointIf E is an elliptic curve defined over a field Fq, then an elliptic curve point P is either: a pair offield elements (xP, yP) (where xP, yP Fq) such that the values x = xPand y = yPsatisfy theequation defining E, or a special point O called the point at in

34、finity. O is the identity element ofthe elliptic curve group.encryption schemeAn encryption scheme is a cryptographic scheme capable of providing data confidentiality.entityA party involved in the operation of a cryptographic system.entity authenticationThe assurance provided to entity U that entity

35、 U has been involved in a real-time communicationwith entity V.2001 ASC X9, Inc. ANSI X9.63-2001 2001 American Bankers Association ANSI X9.63-2001- 5 -ephemeralEphemeral data is relatively short-lived. In this Standard, ephemeral data is data specific to oneexecution of a cryptographic scheme.explic

36、it key authenticationThe assurance provided to entity U that only entities U and V are possibly capable of computingthe session key and that the entities U and V are actually capable of computing the session key.forward secrecyThe assurance provided to an entity U that the session key established be

37、tween entities U and Vwill not be compromised by the compromise of either entitys static private key in the future.Also known as perfect forward secrecy.Gaussian normal basis (GNB)A type of normal basis that can be used to represent the elements of the finite field F2m. (SeeSection 4.1.2.2.)hash fun

38、ctionSee cryptographic hash function.hash valueThe result of applying a cryptographic hash function to a bit string.hybrid formOctet string representation for both the compressed and uncompressed forms of an elliptic curvepoint. (See Section 4.3.6.)implicit key authenticationThe assurance provided t

39、o entity U that only entities U and V are possibly capable of computingthe session key.initiatorAn entity involved in an operation of a protocol that sends the first exchange of the protocol.irreducible binary polynomialA binary polynomial f(x) is irreducible if it cannot be factored into a product

40、of two or morebinary polynomials, each of degree less than the degree of f(x).keySee cryptographic key.key agreement schemeA key agreement scheme is a key establishment scheme in which the keying data established is afunction of contributions provided by both entities in such a way that neither part

41、y canpredetermine the value of the keying data.key-compromise impersonation resilienceThe assurance provided to entity U during an execution of a key establishment scheme that thecompromise of Us static private key has not enabled the impersonation of V to U.key confirmationThe addition of flows to

42、a key establishment scheme providing implicit key authentication sothat explicit key authentication is provided.2001 ASC X9, Inc. ANSI X9.63-2001 2001 American Bankers Association ANSI X9.63-2001- 6 -key derivation functionA key derivation function is a function that takes as input a shared secret v

43、alue and outputskeying data suitable for later cryptographic use.key establishment schemesA key establishment scheme is a cryptographic scheme that establishes keying data suitable forsubsequent cryptographic use by cryptographic schemes to its legitimate users. Key agreementschemes and key transpor

44、t schemes are types of key establishment schemes.keying dataData suitable for use as cryptographic keys.keying materialThe data (e.g., keys, certificates and initialization vectors) necessary to establish and maintaincryptographic keying relationships.key transport schemesA key transport scheme is a

45、 key establishment scheme in which the keying data established isdetermined entirely by one entity.known-key securityThe assurance provided to entity U that the session key established by an execution of a keyestablishment scheme will not be compromised by the compromise of other session keys.messag

46、e authentication code or MAC schemeA message authentication code or MAC scheme is a cryptographic scheme capable of providingdata origin authentication and data integrity.non-repudiationThe assurance provided to entity U that U is able to prove to a third party that data is from V.normal basis (NB)A

47、 type of basis that can be used to represent the elements of the finite field F2m. (See AnnexB.2.3.)octetAn octet is a bit string of length 8. An octet is represented by a hexadecimal string of length 2.The first hexadecimal digit represents the four leftmost bits of the octet, and the secondhexadec

48、imal digit represents the four rightmost bits of the octet. For example, 9D represents thebit string 10011101. An octet also represents an integer in the interval 0, 255. For example, 9Drepresents the integer 157.octet stringAn octet string is an ordered sequence of octets.optimal normal basis (ONB)

49、A type of Gaussian normal basis that can be used to represent the elements of the finite field F2m.(See Section 4.1.2.2.) There are two kinds of ONB, called Type I ONB and Type II ONB.order of a curveThe order of an elliptic curve E defined over the field Fqis the number of points on E, includingO. This is denoted by #E(Fq).2001 ASC X9, Inc. ANSI X9.63-2001 2001 American Bankers Association ANSI X9.63-2001- 7 -order of a pointThe order of a point P is the smallest positive integer n such that nP = O (the point at infinity).ownerThe enti

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1