ANSI X9.24 PART 2-2016 Retail Financial Services Symmetric Key Management Part 2 Using Asymmetric Techniques for the Distribution of Symmetric Keys.pdf

上传人:progressking105 文档编号:439643 上传时间:2018-11-14 格式:PDF 页数:46 大小:465.30KB
下载 相关 举报
ANSI X9.24 PART 2-2016 Retail Financial Services Symmetric Key Management Part 2 Using Asymmetric Techniques for the Distribution of Symmetric Keys.pdf_第1页
第1页 / 共46页
ANSI X9.24 PART 2-2016 Retail Financial Services Symmetric Key Management Part 2 Using Asymmetric Techniques for the Distribution of Symmetric Keys.pdf_第2页
第2页 / 共46页
ANSI X9.24 PART 2-2016 Retail Financial Services Symmetric Key Management Part 2 Using Asymmetric Techniques for the Distribution of Symmetric Keys.pdf_第3页
第3页 / 共46页
ANSI X9.24 PART 2-2016 Retail Financial Services Symmetric Key Management Part 2 Using Asymmetric Techniques for the Distribution of Symmetric Keys.pdf_第4页
第4页 / 共46页
ANSI X9.24 PART 2-2016 Retail Financial Services Symmetric Key Management Part 2 Using Asymmetric Techniques for the Distribution of Symmetric Keys.pdf_第5页
第5页 / 共46页
亲,该文档总共46页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、 American National Standard for Financial Services ANS X9.24 Part 2: 2016 Retail Financial Services Symmetric Key Management Part 2: Using Asymmetric Techniques for the Distribution of Symmetric Keys Secretariat Accredited Standards Committee X9, Incorporated Financial Industry Standards Date Approv

2、ed: November 25, 2016 American National Standards Institute American National Standards, Technical Reports and Guides developed through the Accredited Standards Committee X9, Inc., are copyrighted. Copying these documents for personal or commercial use outside X9 membership agreements is prohibited

3、without express written permission of the Accredited Standards Committee X9, Inc. For additional information please contact ASC X9, Inc., 275 West Street, Suite 107, Annapolis, MD 21401. ANS X9.24 Part 2: 2016 2016 All rights reserved i Foreword Approval of an American National Standard requires ver

4、ification by ANSI that the requirements for due process, consensus, and other criteria for approval have been met by the standards developer. Consensus is established when, in the judgment of the ANSI Board of Standards Review, substantial agreement has been reached by directly and materially affect

5、ed interests. Substantial agreement means much more than a simple majority, but not necessarily unanimity. Consensus requires that all views and objections be considered, and that a concerted effort be made toward their resolution. The use of American National Standards is completely voluntary; thei

6、r existence does not in any respect preclude anyone, whether he has approved the standards or not from manufacturing, marketing, purchasing, or using products, processes, or procedures not conforming to the standards. The American National Standards Institute does not develop standards and will in n

7、o circumstances give an interpretation of any American National Standard. Moreover, no person shall have the right or authority to issue an interpretation of an American National Standard in the name of the American National Standards Institute. Requests for interpretation should be addressed to the

8、 secretariat or sponsor whose name appears on the title page of this standard. CAUTION NOTICE: This American National Standard may be revised or withdrawn at any time. The procedures of the American National Standards Institute require that action be taken to reaffirm, revise, or withdraw this stand

9、ard no later than five years from the date of approval. Published by Accredited Standards Committee X9, Incorporated Financial Industry Standards 275 West Street, Suite 107 Annapolis, MD 21403 USA X9 Online http:/www.x9.org Copyright 2016 Accredited Standards Committee X9, Inc. All rights reserved.

10、No part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without prior written permission of the publisher. Printed in the United States of America. ANS X9.24 Part 2: 2016 2016 All rights reserved ii Contents Foreword i Figures iv Tables v Introducti

11、on vi 1 Purpose 13 2 Scope 14 2.1 Application . 14 3 References . 14 4 Terms and Definitions . 15 5 Standard Organization 21 6 Environment . 22 6.1 General . 22 6.2 Cardholder and Card Issuer . 23 6.3 Card Acceptor 24 6.4 Acquirer 24 6.5 Secure Cryptographic Device (SCD) . 24 6.6 Acquirer Host . 25

12、6.7 Certification Authority . 25 6.8 Device Manufacturer . 25 7 Key Management Requirements 25 7.1 General . 25 7.1.1 Symmetric Keys . 25 7.1.2 Asymmetric Keys . 26 7.2 Secure Cryptographic Devices (SCD) used for Key Management . 27 7.3 A Secure Environment 27 7.4 Certification Authority (CA) Requir

13、ements . 27 7.5 Registration Authority (RA) Requirements . 28 7.6 Key Generation 29 7.6.1 Symmetric Key Generation . 29 7.6.2 Asymmetric Key Generation . 29 7.7 Asymmetric Key Activation/Enablement . 29 7.7.1 Creation of Certificates . 29 7.7.2 Signing of Certificates 30 7.7.3 Lifetime of Certificat

14、es 30 7.7.4 Authentication of Valid Request and Valid Device . 30 7.8 Key Distribution . 30 7.8.1 Symmetric Key Distribution 30 7.8.2 Asymmetric Key Distribution . 31 7.9 Key Utilization 32 7.9.1 Symmetric Key Utilization . 32 7.9.2 Asymmetric Key Utilization 32 7.10 Key Storage 33 7.11 Key Replacem

15、ent . 33 ANS X9.24 Part 2: 2016 2016 All rights reserved iii 7.12 Key Destruction . 33 8 Trust Models and Key Establishment Protocols 34 8.1 Introduction 34 8.2 Trust Models 34 8.2.1 Three-Party Model Third Party CA 34 8.2.2 Two-Party Model One Party Acts as CA . 35 8.2.3 Prior Trust Model No CA 38

16、8.3 Symmetric Key Establishment Protocols 38 8.3.1 Unilateral Key Transport Method . 38 8.3.2 Bilateral Key Transport Method (Both Parties Generate and Share Symmetric Key Joint Control) . 39 8.3.3 Key Agreement Method . 41 Annex A (Normative) Approved ANSI Symmetric Key Algorithms for Encryption of

17、 Private Keys 44 ANS X9.24 Part 2: 2016 iv 2016 All rights reserved Figures Figure 1, Example of Hierarchical Trust Domain/Sub-Domains 23 Figure 2 Three Party Example: Key Distribution to KRDs 35 Figure 3 Two Party Example: Key distribution to KRDs; manufacturer of KRDs plays role of CA . 36 Figure

18、4 Two Party Example: Key distribution to KRDs; KDH plays role of CA 37 Figure 5 Two Party Example: Key distribution between interchange nodes . 37 Figure 6 High Level Overview of Key Transport Method (Unilateral) . 38 Figure 7 High Level Overview of Key Transport Method (Bilateral) 40 Figure 8 High

19、Level Overview of Key Agreement Method 41 ANS X9.24 Part 2: 2016 2016 All rights reserved v Tables Table 1 Trust Models and Key Establishment Protocols . 34 ANS X9.24 Part 2: 2016 vi 2016 All rights reserved Introduction Today, billions of dollars in funds are transferred electronically by various c

20、ommunication methods. Transactions are often entered remotely, off-premise from financial institutions, by retailers or by customers directly. Such transactions are transmitted over potentially non-secure media. The vast range in value, size, and the volume of such transactions expose institutions t

21、o severe risks, which may be uninsurable. To protect these financial messages and other sensitive information, many institutions are making use of the American National Standards Institute Triple Data Encryption Algorithm (TDEA), or the algorithm defined in the Advanced Encryption Standard (AES). Sp

22、ecific examples of TDEA use include standards for message authentication, personal identification number encryption, other data encryption, and key encryption. The TDEA and AES are in the public domain. The security and reliability of any process based on these algorithms is directly dependent on th

23、e protection afforded to secret numbers called cryptographic keys. A familiar analogy may be found in the combination lock of a vault. The lock design is public knowledge. Security is provided by keeping a number, the combination, a secret. Secure operation also depends on protective procedures and

24、features which prevent surreptitious viewing or determination of the combination by listening to its operation. Procedures are also required to ensure that the combination is random and cannot be modified by an unauthorized individual without detection. Part 1 of ANS X9.24 deals exclusively with man

25、agement of symmetric keys using symmetric techniques. This Part 2 addresses the use of asymmetric techniques for the distribution of symmetric keys. Asymmetric techniques utilize algorithms other than the DEA (e.g., Diffie-Hellman, RSA, Elliptic Curve, etc.). Those asymmetric algorithms are defined

26、in other American National Standards Institute standards (e.g., ANS X9.42 Public Key Cryptography for the Financial Services Industry: Agreement of Symmetric Algorithm Keys Using Discrete Logarithm Cryptography, ANS X9.44 DRAFT Public Key Cryptography for the Financial Services Industry: Key Agreeme

27、nt and Key Transport Using Factoring-Based Cryptography, and X9.63 Public Key Cryptography for the Financial Services Industry: Key Agreement and Key Management Using Elliptic Curve-Based Cryptography). Those algorithms are also in the public domain, and the security and reliability are also depende

28、nt on the security and integrity of the asymmetric keys and the infrastructure under which those keys are created and managed. This part of ANS X9.24 assumes the reader is familiar with the concepts behind asymmetric cryptography. NOTEThe users attention is called to the possibility that compliance

29、with this standard may require use of an invention covered by patent rights. By publication of this standard, no position is taken with respect to the validity of this claim or of any patent rights in connection therewith. The patent holder has, however, filed a statement of willingness to grant a l

30、icense under these rights on reasonable and nondiscriminatory terms and conditions to applicants desiring to obtain such a license. Details may be obtained from the standards developer. Suggestions for the improvement of this standard will be welcome. They should be sent to the ASC X9 Secretariat, A

31、ccredited Standards Committee X9, Inc., 275 West Street, Suite 107 Annapolis, MD 21403. The standard was processed and approved for submittal to the American National Standards Institute by the Accredited Standards Committee X9 - Financial Services. Committee approval of the standard does not ANS X9

32、.24 Part 2: 2016 2016 All rights reserved vii necessarily imply that all committee members voted for its approval. At the time it approved this standard, the X9 Committee had the following members: Roy C. DeCicco, X9 Chairman Claudia Swendseid, X9 Vice Chairman Steve Stevens, Executive Director Jane

33、t Busch, Program Director Organization Represented Representative All My Papers . Larry Krummel ACI Worldwide . Doug Grote ACI Worldwide . Dan Kinney American Bankers Association Diane Poole American Express Company . David Moore Bank of America Daniel Welch Bank of New York Mellon . Bryan Kirkpatri

34、ck BlackBerry Limited . Daniel Brown Blackhawk Network . Anthony Redondo Bloomberg LP Corby Dear Capital One Marie LaQuerre Citigroup, Inc. . Karla McKenna CLS Bank . Ram Komarraju Conexxus, Inc. . Michael Davis Conexxus, Inc. . Gray Taylor Delap LLP Darlene Kargel Deluxe Corporation Angela Hendersh

35、ott Diebold, Inc. . Bruce Chapa Discover Financial Services . Michelle Zhang eCurrency David Wen Federal Reserve Bank . Mary Hughes Federal Reserve Bank . Janet LaFrence Federal Reserve Bank . Claudia Swendseid FIS . Stephen Gibson-Saxty Fiserv . Dan Otten FIX Protocol Ltd - FPL . Jim Northey Future

36、x . Ryan Smith Gilbarco Bruce Welch Harland Clarke . John McCleary Hewlett Packard . Susan Langford IBM Corporation . Todd Arnold Independent Community Bankers of America . Cary Whaley Ingenico . Rob Martin ISITC Jason Brasile J.P. Morgan Chase Roy DeCicco KPMG LLP . Mark Lundin MagTek, Inc. Roger A

37、pplewhite MagTek, Inc. Mimi Hart MasterCard Europe Sprl Mark Kamers NACHA The Electronic Payments Association Priscilla Holland National Security Agency . Paul Timmel NCR Corporation . David Norris Office of Financial Research, U.S. Treasury Department . Justin Stekervetz PCI Security Standards Coun

38、cil . Troy Leach RouteOne . Chris Irving RouteOne . Jenna Wolfe ANS X9.24 Part 2: 2016 viii 2016 All rights reserved State Street Corporation . Sharon Cournoyer SWIFT/Pan Americas . Frank Vandriessche Symcor Inc. . Debbi Fitzpatrick TECSEC Incorporated Ed Scheidt The Clearing House Sharon Jablon U.S

39、. Bank John King U.S. Commodity Futures Trading Commission (CFTC) . Robert Stowsky USDA Food and Nutrition Service Kathy Ottobre Vantiv LLC Gary Zempich VeriFone, Inc. . Dave Faoro VISA Kim Wagner Wayne Fueling Systems . Steven Bowles Wells Fargo Bank . Mark Schaffer At the time it approved this sta

40、ndard, the X9F Subcommittee on Data and Information Security had the following members: Dave Faoro, Chairperson Organization Represented Representative ACI Worldwide Richard DuVall ACI Worldwide Doug Grote ACI Worldwide Dan Kinney ACI Worldwide Julie Samson American Bankers Association . Tom Judd Am

41、erican Express Company David Armes American Express Company Eric Eldridge American Express Company William J. Gray American Express Company Farid Hatefi American Express Company Vicky Sammons American Express Company John Timar Bank of America . Amanda Adams Bank of America . Peter Capraro Bank of A

42、merica . Andi Coleman Bank of America . Lawrence LaBella Bank of America . Will Robinson Bank of America . Michael Smith Bank of America . Daniel Welch BlackBerry Limited Daniel Brown BlackBerry Limited Sandra Lambert Blackhawk Network Anthony Redondo Bloomberg LP . Erik Anderson Bloomberg LP . Corb

43、y Dear Capital One . Marie LaQuerre Capital One . Johnny Lee Cipherithm Scott Spiker comForte 21 GmbH Thomas Gloerfeld comForte 21 GmbH Henning Horst Communications Security Establishment . Jonathan Hammell Communications Security Establishment . David Smith Conexxus, Inc. Alan Thiemann CUSIP Servic

44、e Bureau . Scott Preiss Delap LLP . David Buchanan ANS X9.24 Part 2: 2016 2016 All rights reserved ix Delap LLP Darlene Kargel Deluxe Corporation Angela Hendershott Deluxe Corporation Margiore Romay Deluxe Corporation Andy Vo Diebold, Inc. . Bruce Chapa Diebold, Inc. . Michael Ott Diebold, Inc. . Da

45、ve Phister Discover Financial Services . Cheryl Mish Discover Financial Services . Diana Pauliks Discover Financial Services . Jordan Schaefer eCurrency David Wen Federal Reserve Bank . Patrick Adler Federal Reserve Bank . Cynthia Baxter Federal Reserve Bank . Guy Berg Federal Reserve Bank . Julia C

46、heney Federal Reserve Bank . Marianne Crowe Federal Reserve Bank . Sandeep Dhameja Federal Reserve Bank . Amanda Dorphy Federal Reserve Bank . Mary Hughes Federal Reserve Bank . Heather Hultquist Federal Reserve Bank . Janet LaFrence Federal Reserve Bank . Jackie Nugent Federal Reserve Bank . Jim OC

47、onnell Federal Reserve Bank . Susan Pandy Federal Reserve Bank . Patti Ritter Federal Reserve Bank . Daniel Rozycki Federal Reserve Bank . Rick Sullivan Federal Reserve Bank . Claudia Swendseid First Data Corporation Andrea Beatty First Data Corporation Lisa Curry First National Bank of Omaha Kristi

48、 White Fiserv . Bud Beattie Fiserv . Dan Otten Futurex . Ryan Smith GEOBRIDGE Corporation . Donna Gem GEOBRIDGE Corporation . Jason Way Gilbarco Bruce Welch Harland Clarke . Joseph Filer Heartland Payment Systems . Scott Meeker Hewlett Packard . Susan Langford Hewlett Packard . Terence Spies IBM Cor

49、poration . Todd Arnold Independent Community Bankers of America . Cary Whaley Ingenico . Rob Martin ITS, Inc. (SHAZAM Networks) . Manish Nathwani J.P. Morgan Chase Bruce Geller J.P. Morgan Chase Kathleen Krupa J.P. Morgan Chase Jackie Pagn K3DES LLC Azie Amini KPMG LLP . Mark Lundin MagTek, Inc. Jeff Duncan MagTek, Inc. Mimi Hart MasterCard Europe Sprl Mark Kamers MasterCard Europe Sprl Joshua Knopp MasterCard Europe Sprl Larry Newell MasterCard Europe Sprl Adam Sommer ANS X9.24 Part 2: 2016 x 2016

展开阅读全文
相关资源
  • ANSI Z97 1-2009 American National Standard for Safety Glazing Materials used in Buildings - Safety Performance Specifications and Methods of Test《建筑物中窗用玻璃材料安全性用.pdfANSI Z97 1-2009 American National Standard for Safety Glazing Materials used in Buildings - Safety Performance Specifications and Methods of Test《建筑物中窗用玻璃材料安全性用.pdf
  • ANSI Z97 1 ERTA-2010 Re ANSI Z97 1 - 2009 Errata《修订版 美国国家标准学会Z97 1-2009标准的勘误表》.pdfANSI Z97 1 ERTA-2010 Re ANSI Z97 1 - 2009 Errata《修订版 美国国家标准学会Z97 1-2009标准的勘误表》.pdf
  • ANSI Z21 40 2a-1997 Gas-Fired Work Activated Air-Conditioning and Heat Pump Appliances (Same as CGA 2 92a)《燃气、工作激活空气调节和热泵器具(同 CGA 2 92a)》.pdfANSI Z21 40 2a-1997 Gas-Fired Work Activated Air-Conditioning and Heat Pump Appliances (Same as CGA 2 92a)《燃气、工作激活空气调节和热泵器具(同 CGA 2 92a)》.pdf
  • ANSI Z124 9-2004 American National Standard for Plastic Urinal Fixtures《塑料小便器用美国国家标准》.pdfANSI Z124 9-2004 American National Standard for Plastic Urinal Fixtures《塑料小便器用美国国家标准》.pdf
  • ANSI Z124 4-2006 American National Standard for Plastic Water Closet Bowls and Tanks《塑料抽水马桶和水箱用美国国家标准》.pdfANSI Z124 4-2006 American National Standard for Plastic Water Closet Bowls and Tanks《塑料抽水马桶和水箱用美国国家标准》.pdf
  • ANSI Z124 3-2005 American National Standard for Plastic Lavatories《塑料洗脸盆用美国国家标准》.pdfANSI Z124 3-2005 American National Standard for Plastic Lavatories《塑料洗脸盆用美国国家标准》.pdf
  • ANSI T1 659-1996 Telecommunications - Mobility Management Application Protocol (MMAP) RCF-RACF Operations《电信 可移动管理应用协议(MMAP) RCF-RACF操作》.pdfANSI T1 659-1996 Telecommunications - Mobility Management Application Protocol (MMAP) RCF-RACF Operations《电信 可移动管理应用协议(MMAP) RCF-RACF操作》.pdf
  • ANSI T1 651-1996 Telecommunications – Mobility Management Application Protocol (MMAP)《电信 可移动性管理应用协议》.pdfANSI T1 651-1996 Telecommunications – Mobility Management Application Protocol (MMAP)《电信 可移动性管理应用协议》.pdf
  • ANSI T1 609-1999 Interworking between the ISDN User-Network Interface Protocol and the Signalling System Number 7 ISDN User Part《电信 ISDN用户间网络接口协议和7号信令系统ISDN用户部分.pdfANSI T1 609-1999 Interworking between the ISDN User-Network Interface Protocol and the Signalling System Number 7 ISDN User Part《电信 ISDN用户间网络接口协议和7号信令系统ISDN用户部分.pdf
  • ANSI T1 605-1991 Integrated Services Digital Network (ISDN) - Basic Access Interface for S and T Reference Points (Layer 1 Specification)《综合服务数字网络(ISDN) S和T基准点的.pdfANSI T1 605-1991 Integrated Services Digital Network (ISDN) - Basic Access Interface for S and T Reference Points (Layer 1 Specification)《综合服务数字网络(ISDN) S和T基准点的.pdf
  • 猜你喜欢
    相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > ANSI

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1