1、Adopted by INCITS (InterNational Committee for Information Technology Standards) as an American National Standard.Date of ANSI Approval: 12/30/2003Published by American National Standards Institute,25 West 43rd Street, New York, New York 10036Copyright 2003 by Information Technology Industry Council
2、 (ITI).All rights reserved.These materials are subject to copyright claims of International Standardization Organization (ISO), InternationalElectrotechnical Commission (IEC), American National Standards Institute (ANSI), and Information Technology Industry Council(ITI). Not for resale. No part of t
3、his publication may be reproduced in any form, including an electronic retrieval system, withoutthe prior written permission of ITI. All requests pertaining to this standard should be submitted to ITI, 1250 Eye Street NW,Washington, DC 20005.Printed in the United States of AmericaReference numberISO
4、/IEC 7064:2003(E)ISO/IEC 2003INTERNATIONAL STANDARD ISO/IEC7064First edition2003-02-15Information technology Security techniques Check character systems Technologies de linformation Techniques de scurit Systmes de caractres de contrle Copyright American National Standards Institute Provided by IHS u
5、nder license with ANSINot for ResaleNo reproduction or networking permitted without license from IHS-,-,-ISO/IEC 7064:2003(E) PDF disclaimer This PDF file may contain embedded typefaces. In accordance with Adobes licensing policy, this file may be printed or viewed but shall not be edited unless the
6、 typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept therein the responsibility of not infringing Adobes licensing policy. The ISO Central Secretariat accepts no liability in this area. Adobe is a trademark of Ad
7、obe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the u
8、nlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below. ISO/IEC 2003 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, inclu
9、ding photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Publish
10、ed in Switzerland ii ISO/IEC 2003 All rights reservedCopyright American National Standards Institute Provided by IHS under license with ANSINot for ResaleNo reproduction or networking permitted without license from IHS-,-,-ISO/IEC 7064:2003(E) ISO/IEC 2003 All rights reserved iiiContents1Scope 12Ter
11、msanddefinitions 13Symbolsandnotation 24Typesofsystems 24.1 Pure systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24.2 Hybrid systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25Complianceandde
12、signation 25.1 Strings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25.2 Check character generating products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25.3 Checking products . . . . . . . . . . . . . . . . . . . .
13、 . . . . . . . . . . . . . . . . . . . . . . . . . 25.4 System designation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26Specificationofpuresystems 36.1 Formula . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
14、 . . . . 36.2 Calculation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46.3 Check character position . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47Computationalmethodsforpuresystemswithonecheckcharacter 47.1
15、 Pure system recursive method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47.1.1 Computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47.1.2 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
16、. . . . . . . . . . . . 57.2 Pure system polynomial method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57.2.1 Computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57.2.2 Example . . . . . . . . . . . . . . . . . . . . . . .
17、 . . . . . . . . . . . . . . . . . . . . . . . . 58Computationalmethodsforpuresystemswithtwocheckcharacters 68.1Computation68.2Exampleusingrecursivemethod.68.3 Example using polynomial method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78.4 Simplified procedure for ISO/IE
18、C 7064, MOD 9710 . . . . . . . . . . . . . . . . . . . . . . . . . . 79Specificationforhybridsystems 79.1 Formula . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79.2 Check character position . . . . . . . . . . . . . . . . . . . . . . . . . . .
19、. . . . . . . . . . . . . . . 810Computationalmethodforhybridsystems 810.1Hybridsystemrecursivemethod.810.1.1 Computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 810.1.2Example.8Annex A (informative) Criteria for the selection of check character system
20、s for applications . 10Annex B (informative) Check character systems for other alphabets . 12Bibliography 13Copyright American National Standards Institute Provided by IHS under license with ANSINot for ResaleNo reproduction or networking permitted without license from IHS-,-,-ISO/IEC 7064:2003(E) i
21、v ISO/IEC 2003 All rights reservedForeword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of Inte
22、rnational Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaiso
23、n with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. The main task of the joint techni
24、cal committee is to prepare International Standards. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote. Attention is dr
25、awn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. ISO/IEC 7064 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee S
26、C 27, IT Security techniques. This first edition of ISO/IEC 7064 cancels and replaces ISO 7064:1983, which has been technically revised. Note,however, that implementations which comply with ISO 7064:1983 will be compliant with ISO/IEC 7064:2003. Copyright American National Standards Institute Provid
27、ed by IHS under license with ANSINot for ResaleNo reproduction or networking permitted without license from IHS-,-,-ISO/IEC 7064:2003(E) ISO/IEC 2003 All rights reserved vIntroductionThe need for standardization of check character systems was determined by the following considerations:a)ofthemultitu
28、deofsystemsinuse,manyhaveverysimilarcharacteristics,andmuchofthevarietyfailstoprovideanysignificantbenefit;b)fewoftheexistingsystemshavebeenthoroughlyverifiedmathematicallyandseveralhaveseriousdefects;c) the variety of systems undermines the economics of products which generate or validate check cha
29、racters, andfrequentlypreventsthecheckingofinterchangeddata.Therefore a small set of compatible systems were selected to cope with various application needs; they werevalidated, and within the constraints of each application, offer high protection against typical transcription andkeying errors.Exist
30、ing check character systems as specified in ISO 2108, ISO 2894 and ISO 6166 are used in special applicationfields (ISO 2894 has been withdrawn). These do not however, achieve the error detection rate of the systemsspecified in this International Standard.Annex A summarizes the criteria to be conside
31、red when selecting a check character system specified in thisInternational Standard for a particular application.Annex B provides an example of a method by which this standard may be applied to an alphabet that has morethan 26 characters.Copyright American National Standards Institute Provided by IH
32、S under license with ANSINot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Copyright American National Standards Institute Provided by IHS under license with ANSINot for ResaleNo reproduction or networking permitted without license from IHS-,-,-INTERNATIONALSTANDARD
33、ISO/IEC 7064:2003(E)Information technology Security techniques Check character systems1 Scope1.1 This International Standard specifies a set ofcheck character systems capable of protecting stringsagainst errors which occur when people copy or typedata. The strings may be of fixed or variable lengtha
34、nd may have character sets which area) numeric (10 digits: 0 to 9);b) alphabetic (26 letters: A to Z); andc) alphanumeric (letters and digits).Embedded spaces and special characters are ignored.1.2 This International Standard specifies confor-mance requirements for products described as gener-ating
35、check characters or checking strings using thesystems given in this International Standard.1.3 These check character systems can detect:a) all single substitution errors (the substitution of asingle character for another, for example “4234”for “1234)”;b) all or nearly all single (local) transpositio
36、n errors(the transposition of two single characters, eitheradjacent or with one character between them, forexample “12354” or “12543” for “12345”);c) all or nearly all circular shift errors (circular shiftsof the whole string to the left or right);d) a high proportion of double substitution er-rors
37、(two separate single substitution errors inthe same string, for example “7234587” for“1234567)”; ande) a high proportion of all other errors.1.4 This International Standard excludes systemsdesigned specifically to:a) permit both error detection and automatic correc-tion;b) detect deliberate falsific
38、ation; andc) check strings interchanged solely between ma-chines.1.5 This International Standard is for use in infor-mation interchange between organizations. It is alsostrongly recommended for use in internal informationsystems.2 Terms and definitionsFor the purposes of this International Standard,
39、 thefollowing terms and definitions apply.2.1 check character: Added character which maybe used to verify the accuracy of the string by amathematical relationship to that string.2.2 check character system: Set of rules for gen-erating check characters and checking strings in-corporating check charac
40、ters.2.3 supplementary check character: Checkcharacter which does not belong to the charac-ter set of the strings which are to be protected.2.4 modulus: Integer used as a divisor of an integerdividend in order to obtain an integer remainder.2.5 congruence: Property of a set of integers whichdiffer f
41、rom each other by a multiple of the mod-ulus. Congruence is indicated by the symbol .For example, 39 6 (mod11) indicates that 39and 6 are congruent with respect to the modulus11, i.e., 39 6 = 33, which is a multiple of 11.2.6 radix: Base of a geometric progression.cISO/IEC2003 Allrightsreserve 1Copy
42、right American National Standards Institute Provided by IHS under license with ANSINot for ResaleNo reproduction or networking permitted without license from IHS-,-,-ISO/IEC7064:2003(E)3SymbolsandnotationThroughout ISO/IEC 7064 the following symbols andnotation are used.aiNumerical value of the char
43、acter in position i.i Index of the character position.M Modulus.n Number of characters in a string, including thecheck character.Pj, Sj, V Integers which are used in the calculationof the check character to store an intermediateresult.r Radix.wjWeight for the polynomial method.X, Supplementary check
44、 characters.:= A symbol denoting the set equal to operationused in the procedural specifications of checkcharacters, which indicates that the value of theinteger on the left side of the symbol shall bemade equal to the value of the expression on theright side of the symbol. A symbol denoting congrue
45、nce (see Clause 2.5).bardblMA symbol denoting the unique integer between 1and M that is the remainder after dividing by M;if this remainder is zero then the value M shallbe substituted.|M+1A symbol denoting the unique integer between0 and M that is the remainder after dividing byM +1; the remainder
46、is never zero after this op-eration.(modM) A symbol denoting the unique integer be-tween 0 and M 1 that is the remainder afterdividing by M.4 Types of systemsThis International Standard specifies two types of sys-tems:a) pure systems (Clauses 6, 7 and 8) andb) hybrid systems (Clauses 9 and 10).4.1 P
47、ure systemsThe pure systems are listed in Table 1 and specifiedin Clauses 6, 7 and 8. They each use a single modulusfor all stages of the calculation.4.2 Hybrid systemsThe hybrid systems are listed in Table 2 and specifiedin Clauses 9 and 10. The hybrid systems each usetwo moduli in the calculation. One modulus is equalto, and the other is one greater than, the numberof characters in the character set of the string to beprotected. These hy