ImageVerifierCode 换一换
格式:PDF , 页数:31 ,大小:225.88KB ,
资源ID:431351      下载积分:5000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-431351.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ANSI ASC X9 X9.69-2007 Framework for Key Management Extensions.pdf)为本站会员(sumcourage256)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ANSI ASC X9 X9.69-2007 Framework for Key Management Extensions.pdf

1、American National Standard for Financial Services ANSI X9.692006 Framework for Key Management Extensions Accredited Standards Committee X9, Incorporated Financial Industry Standards Date Approved: American National Standards Institute ASC X9, Inc. 2006 All rights reserved ANS ANSI X9.692006 2 ASC X9

2、, Inc. 2006 All rights reservedContents Page Forword .4 Introduction.5 1 Scope17 2 Normative references17 3 Terms, symbols and abbreviated terms17 4 Application .18 4.1 General .18 4.2 The Use of Constructive Key Management 19 4.3 The Use of Key Usage Control Vector.19 4.4 System Algorithm and Syste

3、m Key.19 5 Constructive Key Management19 5.1 Overview.19 5.2 CKM Administration 21 5.2.1 Credentials .21 5.2.2 Splits.21 5.3 Token Distribution.22 5.3.1 Workstation22 5.3.2 Token 22 5.4 Key Creation.22 5.4.1 Key Component Selection23 5.4.2 Key Combiner 23 5.4.3 Key Reconstruction.23 6 Key Usage Cont

4、rol 24 6.1 Overview.24 6.2 Key Binding Methods25 6.2.1 Binding Method 1 25 6.2.2 Binding Method 2 25 6.2.3 Binding Method 3 26 6.2.4 Binding Method 4 26 6.2.5 Binding Method 5 27 6.2.6 Binding Method 6 27 Annex A (informative) Example Key Usage Vector Formats 28 A.1 General .28 A.2 Examples28 Biblio

5、graphy31 ANS ANSI X9.692006 ASC X9, Inc. 2006 All rights reserved 3Figures Figure 1 - Token Distribution 20 Figure 2 - Combiner Function.23 Figure 3 - Key Usage Vector Fields25 ANS ANSI X9.692006 4 ASC X9, Inc. 2006 All rights reservedForword Approval of an American National Standard requires verifi

6、cation by ANSI that the requirements for due process, consensus, and other criteria for approval have been met by the standards developer. Consensus is established when, in the judgment of the ANSI Board of Standards Review, substantial agreement has been reached by directly and materially affected

7、interests. Substantial agreement means much more than a simple majority, but not necessarily unanimity. Consensus requires that all views and objections be considered, and that a concerted effort be made toward their resolution. The use of American National Standards is completely voluntary; their e

8、xistence does not in any respect preclude anyone, whether he has approved the standards or not from manufacturing, marketing, purchasing, or using products, processes, or procedures not conforming to the standards. The American National Standards Institute does not develop standards and will in no c

9、ircumstances give an interpretation of any American National Standard. Moreover, no person shall have the right or authority to issue an interpretation of an American National Standard in the name of the American National Standards Institute. Requests for interpretation should be addressed to the se

10、cretariat or sponsor whose name appears on the title page of this standard. CAUTION NOTICE: This American National Standard may be revised or withdrawn at any time. The procedures of the American National Standards Institute require that action be taken to reaffirm, revise, or withdraw this standard

11、 no later than five years from the date of approval. Published by Accredited Standards Committee X9, Incorporated Financial Industry Standards P.O. Box 4035 Annapolis, MD 21403 USA X9 Online http:/www.x9.org Copyright 2006 ASC X9, Inc. All rights reserved. No part of this publication may be reproduc

12、ed in any form, in an electronic retrieval system or otherwise, without prior written permission of the publisher. Published in the United States of America. ANS ANSI X9.692006 ASC X9, Inc. 2006 All rights reserved 5Introduction This Standard is concerned with symmetric key systems in which the encr

13、ypting key and decrypting key are identical. The security and reliability of any process based on a symmetric cryptographic algorithm is directly dependent on the protection afforded to the secret quantity, called the key. Thus, no matter how strong the algorithm, the system is only as secure as its

14、 key management method. This Standard defines two specific key management methods for controlling and handling keys, called (1) Constructive Key Management and (2) Key Usage Control. Each method can be used independently; or the methods can be used in combination. However, the combined use of the me

15、thods is highly recommended by the ASC X9 Subcommittee responsible for this Standard. Each method is described in a separate section of the Standard. The section on CONSTRUCTIVE KEY MANAGEMENT, systematizes key creation, implementing “dual control” or “split knowledge” by using key components to con

16、struct the final working key. This working key may be used in several ways including as a session key, for a store-and-forward (i.e. e-mail) application, and for file encryption applications, such as archiving, or protecting filed information until needed again by the user. Other applications are al

17、so possible. Until now, this practice of split knowledge key creation has been used mainly to transport key parts into systems where “master keys” were used to protect keys in storage, and to recover the working keys for a current application. With the methodology of this Standard, a working key wil

18、l be created as needed for a specific encryption process, and re-created when needed to decrypt the object. Depending on the application, the key may be saved or destroyed after each use. The working key is never transmitted; the application program only knows it while it is in use. The section on K

19、EY USAGE CONTROL, allows the creator of a key to specify the allowed uses of the key. For example, key usage control information can be used to distinguish key types (data, PIN, or key-encrypting). The type “data key” can be further sub-divided to distinguish data privacy keyskeys used to encrypt an

20、d decrypt datafrom Message Authentication Code (MAC) keys-keys used to protect the integrity of data. The method attaches or binds a “key usage vector” to each generated key, for the life of the key, and is used by the system to ensure that keys are used properly. In short, the key usage vector prev

21、ents abuses and attacks against the key. The key usage vector can be used to protect keys stored within a single system, or to protect keys transmitted from one system to another. This Standard is algorithm independent, and as new cryptographic algorithms with perhaps longer key lengths than current

22、ly in use are developed and adopted by the Financial Community this Standard will still apply. NOTE The users attention is called to the possibility that compliance with this standard may require use of an invention covered by patent rights. By publication of this standard, no position is taken with

23、 respect to the validity of this claim or of any patent rights in connection therewith. The patent holder has, however, filed a statement of willingness to grant a license under these rights on reasonable and nondiscriminatory terms and conditions to applicants desiring to obtain such a license. Det

24、ails may be obtained from the standards developer. Suggestions for the improvement or revision of this Standard are welcome. They should be sent to the X9 Committee Secretariat, Accredited Standards Committee X9, Inc., Financial Industry Standards, P.O. Box 4035, Annapolis, MD 21403 USA. This Standa

25、rd was processed and approved for submittal to ANSI by the Accredited Standards Committee on Financial Services, X9. Committee approval of the Standard does not necessarily imply that all the committee members voted for its approval. ANS ANSI X9.692006 6 ASC X9, Inc. 2006 All rights reservedThe X9 c

26、ommittee had the following members: Jim Schaffer, X9 Chairman Vincent DeSantis, X9 Vice-Chairman Cynthia Fuller, Executive Director Susan Yashinskie, Managing Director Organization Represented RepresentativeAmerican Bankers Association C. Diane Poole American Express Company John Allen American Fina

27、ncial Services Association Mark Zalewski Bank of America Daniel Welch Certicom Corporation Daniel Brown Citigroup, Inc. Gary Word Clarke American Checks, Inc. John McCleary CUSIP Service Bureau James Taylor Deluxe Corporation John FitzPatrick Diebold, Inc. Bruce Chapa Discover Financial Services Kat

28、ie Howser Federal Reserve Bank Dexter Holt First Data Corporation Rick Van Luvender Fiserv Skip Smith FSTC, Financial Services Technology Consortium Daniel Schutzer Hewlett Packard Larry Hines Hypercom Scott SpikerIBM Corporation Todd Arnold Ingenico John Spence Intuit, Inc. Jana Hocker J.P. Morgan

29、Chase refer to Technical Guideline: Technical Guideline: Managing Risk and Migration Planning: Withdrawal of ANSI X9.9 (X9 TG-24-1999) X9.17 Financial Institution Key Management (Wholesale); refer to Technical Guideline: Managing Risk and Migration Planning: Withdrawal of ANSI X9.17 (X9 TG-26 1999)

30、C. The follow terms were changed: Policy Manager was changed to CKM Administration Labels was changed to Credentials ANS ANSI X9.692006 12 ASC X9, Inc. 2006 All rights reserved Credential Manager was changed to Token Distribution D. The document was converted to the current X9/ISO standards template

31、. At the time the original X9.69-1999 was approved, the X9 committee had the following members: Harold Deal, X9 Chairman William E. Lyons, X9 Vice Chairman Cynthia Fuller, Managing Director Organization Represented RepresentativeAmerican Bankers Association Anne Livingston Kawika Daguio American Exp

32、ress Company Bonnie Howard Applied Communications Douglas Grote Cindy Rink Automated Financial Services Tom Clute Banc One Services Corporation William Lyons Bank of America Gretchen Breiling Bankers Roundtable Kit Needlam Keviar Warner Canadian Bankers Association Christine ArjoonLaL Mark Bakic Cha

33、se Manhattan Bank Christopher Dowdell Francis Keenan Citibank Seymour Rosen Cybersafe Corp Glenda Barnes Deluxe Corporation Maury Jansen Ernst See for example ANSI X9.24 Financial Institution Key Management (Retail), or ISO/IEC 11770-2, Key Management, Part 2: Mechanisms using symmetric techniques.

34、Mechanisms to store, archive, delete, destroy, etc. keys; Mechanisms for key recovery in the event of the failure or loss of keys. The Standard also does not define the implementation of key management mechanisms; there may be different products that comply with this Standard and yet are not interop

35、erable. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. ANS X3.92-1981 Dat

36、a Encryption Algorithm ANS X3.106-1983 Data Encryption Algorithm - Modes of Operation ANS X9.19 Financial Institution Retail Message Authentication ANS X9.52 Triple Data Encryption Algorithms (3DEA) Modes of Operation FIPS 197 Advanced Encryption Standard (AES) 3 Terms, symbols and abbreviated terms

37、 For the purposes of this document, the following terms and definitions apply. ANS ANSI X9.692006 18 ASC X9, Inc. 2006 All rights reserved3.1 3DEA Triple Data Encryption Algorithm 3.2 AES Advanced Encryption Standard 3.3 C Key Usage Control Vector 3.4 CBC Cipher Block Chaining - one of the four mode

38、s of 3DEA 3.5 CKM Constructive Key Management 3.6 ECB Electronic Codebook - one of the four modes of 3DEA 3.7 K Key 3.8 MAC Message Authentication Code 3.9 PIN Personal Identification Number 3.10 PR Private (secret) key of a public key encryption algorithm 3.11 PU Public (non-secret) key of a public

39、 key encryption algorithm 3.12 S Cryptographic Services and Modes provided in the Key Management System 3.13 SMIB Security Management Information Base 3.14 U Usage Field; a binary vector where the bit field specifies the use(s) for each key 4 Application 4.1 General In a cryptographic system it may

40、be desirable to generate keys using a constructive process, where keys are derived from system-specified control information, as well as secret random data. It may also be desirable to attach a “key usage vector” to each key, defining how the key shall be used. ANS ANSI X9.692006 ASC X9, Inc. 2006 A

41、ll rights reserved 194.2 The Use of Constructive Key Management With Constructive Key Management (CKM), key components, called splits, shall be generated with a random or pseudorandom number generator. Each of these splits shall be given a name, called a Credential that provides some meaningful info

42、rmation to the sender, and allows the sender to direct the encrypted object to a selected set of end-users. The working key shall be constructed by combining the addressee splits with the system generated and controlled splits. Thus, with CKM it is possible to create a group key for a particular set

43、 of end-users. Other recipients, who are not members of the group, will be unable to re-construct that particular group key. 4.3 The Use of Key Usage Control Vector With Key Usage Control Vectors, keys shall be generated using any acceptable method of key generation. Then a key usage vector shall be

44、 attached to the key. This vector specifies cryptographic services, modes and key parameters, in which the associated key shall be used. This usage vector shall be securely bound to the key to prevent misuse of the key or misinterpretation of its use. 4.4 System Algorithm and System Key The CKM oper

45、ations system shall use a common system-wide encryption algorithm and key to wrap the header of encrypted objects as they transit communications networks. The purpose is privacy, not security. For example, when multiple objects are sent in a batch mode, recipients need to be able to unwrap the bundl

46、e and determine from the encrypted header information which object(s) is addressed to them. Security is not compromised because the objects themselves are encrypted using secret splits that only the addressees of each object possess. 5 Constructive Key Management 5.1 Overview Constructive Key Manage

47、ment is exactly what the name implies: key is constructed as needed by the originator of the message, and can only be re-constructed by intended recipients. In the interim, Credentials of the key components are associated with the encrypted object. For example, in an e-mail message, they might be pa

48、ssed, encrypted under a system key in the message header (depending on the protocol). In a session-oriented protocol, they might be exchanged as part of the key management protocol, and stored locally in the security management information base (SMIB). This means the encrypting key is always fully r

49、ecoverable and the message is always decryptable by the appropriate audience. There are two major administrative functions required to manage the CKM system: the CKM Administration (see 5.2 CKM Administration) and the Token Distribution (see 5.3 Token Distribution). In large organizations, these could be independent of each other. The CKM Administration function shall design the overall interconnectivity and read-write privileges in the system, and create the Credentials and splits. The Token Distribution function shall

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1