在好例子网,分享、交流、成长!
您当前所在位置:首页Others 开发实例一般编程问题 → ANS X9.24-1:2009

ANS X9.24-1:2009

一般编程问题

下载此实例
  • 开发语言:Others
  • 实例大小:0.62M
  • 下载次数:1
  • 浏览次数:184
  • 发布时间:2020-08-06
  • 实例类别:一般编程问题
  • 发 布 人:robot666
  • 文件格式:.pdf
  • 所需积分:2
 

实例介绍

【实例简介】
Retail Financial Services Symmetric Key Management
ANSX9.241:2009 Foreword Approval of an American National Standard requires verification by ansi that the requirements for due process consensus, and other criteria for approval have been met by the standards developer Consensus is established when, in the judgment of the ANSI Board of Standards Review, substantial agreement has been reached by directly and materially affected interests. Substantial agreement means much more than a simple majority, but not necessarily unanimity. Consensus requires that all views and objections be considered and that a concerted effort be made toward their resolution The use of American National Standards is completely voluntary; their existence does not in any respect preclude anyone, whether he has approved the standards or not from manufacturing, marketing purchasing or using products, processes, or procedures not conforming to the standards The American National Standards Institute does not develop standards and will in no circumstances give an interpretation of any American National Standard. Moreover, no person shall have the right or authority to issue an interpretation of an American National standard in the name of the american National Standards Institute Requests for interpretation should be addressed to the secretariat or sponsor whose name appears on the title page of this standard CAUTION NOTICE: This American National Standard may be revised or withdrawn at any time the procedures of the American National standards Institute require that action be taken to reaffirm revise or withdraw this standard no later than five years from the date of approval Published by Accredited standards committee x9, Incorporated Financial Industry standards 1212 West Street, Suite 200 Annapolis Md 21401 USA X9Onlinehttp:/www.x9.org Copyright C 2009 Accredited Standards Committee X9, Inc All rights reserved No part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without prior written permission of the publisher. Printed in the United States of America o 2009- All rights reserved Licensed to George Jiang. ANSI order X 170098 Downloaded 4/28/201011: 40 AM. Single user license only Copying and networking prohibited ANSX924-1:2009 Contents Foreword Figures...…. Tab|es∴ ntroduction.…………………… 日B国 Purpose cope… 2.1 Application…….….….….….…..….….….….….….….….….….….….….….….….….….….……..17 3 References . Terms and definitions 面量面国日画日面m面 18 Standard Organization...,,…,,… 24 6 Environment 24 6.1 General…… 24 6.2 Cardholder and card issuer 24 63 Card Acceptor.. .aee....e... 24 Acquirer 面国国面面 Key Management Requirements…………… 25 7.1 General 25 7.2 Tamper-Resistant Security Modules (TRSM)used for Key Management 26 7.3 A Secure Environment 28 74 Key generation .28 7.5 Symmetric Key distribution ■■ 28 7.5.1 Manual distribution 7.5.2 Key Initialization Facility. 29 7.5.3 Key Loading Device…,,,,,,,,,,,,,,,,,,,,,…,…,…,29 7.6 Key Utilization… 29 7 Key Replacement.… 30 7. 8 Key Destruction and ArchivaL 30 7.9keyEncryptionDecryption..,,,,… 30 8 Key Management Specifications 30 8.1 Genera…30 8.2 Methods of Key Management. 8.2.1 Key Management Methods Requiring Compromise Prevention Controls.. 31 8.2.2 Key Management Method Requiring Compromise Detection Controls.. 32 8.3 Key Identification Techniques 32 831 Implicit Key Identification.…,…,… 32 8.32 Key Identification by Name……….….…..….….…….….…………,……….…………,…,…………………32 84 Security Management Information Data(SMD) Element.…...,…,……,……………,……,……….32 8. 4.1 Notations abbreviations and conventions 34 8.4.2 Representation. 35 8.4.3 Key Naming 37 8.5 Method: Fixed Transaction Keys 38 8.51SM|D. 38 c 2009- All rights reserved Licensed to George Jiang. ANSI order X 170098 Downloaded 4/28/201011: 40 AM. Single user license only Copying and networking prohibited ANSX9.24-1:2009 852 Additional Key Management Requirements…………… 39 8.5.3 Additional notes n…39 8.6 Method: Master Keys transaction Keys . 8.6.1SM|D 8.6.2 Additional Key Management Requirements..mm.man. 40 8. 6. 3 Additional notes n…40 8.7 Method: DUKPT(Derived Unique Key Per Transaction)... 41 8.71sM|D ………43 8.7.2 Additiona| Key Management Requirements……,,,,,,,,,,…,…, 8.7.3 Additional notes 44 Annex a( Informative) Derived Unique Key Per Transaction….......…,…… 45 A.1 Storage Areas.,………45 A.1.1P| N Processing………….… A.1.2 Key Management 45 A.2 Processing algorithms….......…...…,,,………..,……46 A3 Key Management 50 A 4 DUKPT Test Data Examples 54 A.4.1 Variants of the Current Key…………….….…………….….…………………………55 A.4.2 Initial Sequence 58 A, 4.3 MSB Rollover Sequence 62 A.4.4 Calculation and storage of dUKPT Transaction Keys at the Terminal 国面面国 A.5Security Module"Algorithm For Automatic A 6 Derivation Of The Initial Key.aa. 69 Annex B(Informative)SMID EXamples 70 Annex C(Informative) 75 C 1 Overview of Key Management.. 75 C2 Objectives of initial key distribution 面■ 77 C3 Requirements for initial ∴77 C31 Key generation…,,… 77 C32 Key transport.… 78 C.3.3 Key insertion…… 79 C4 Implementation considerations 80 C.4.1 Key generation……,…,,,…,,,,,,,,,,……,,……,,…,…,"…,………81 C 4.2 Key transport 8 C4.3 Key loading…........…,…,………….81 C44 Protection of cryptographic devices…… 82 C.4.5 Reloading of cryptographic devices..-.. 84 C.5 Example of manual key distribution…… Example of key loading controls at a manufacturer's facili 84 c.6 87 Annex D(Informative) Key set Identifiers.mm.m.m.... 88 D.1 An Example Key Serial Number Format….… 88 D.11|N-3 Bytes- Issuer Identification Number.……… D.1.2 CID-1 Byte-Customer ID 89 D.13G|D·1Byte· Group ID… 89 D.14DD-19 Bit device D,………………89 D.1.5 TCTR-21 Bit Transaction Counter 90 C 2009-All rights reserved Licensed to George Jiang. ANSI order X 170098 Downloaded 4/28/201011: 40 AM. Single user license only Copying and networking prohibited ANSX924-1:2009 Figures Figure 1-DUKPT at Receiving TRSM 42 Figure 2-duKPT at Originating TRSM 43 Figure A-1-Key calculation for PIN-encrypting key and mac keys .56 Figure A-2- Key calculation for Data Encryption keys 56 Figure C-1-Example transaction flow 75 Figure C-2- Characteristics of initial key distribution 76 Figure C-3- Generating Key check value 86 Figure D-1-Key Serial Number Format EXample 89 2009-All rights reserved Licensed to George Jiang. ANSI order X 170098 Downloaded 4/28/201011: 40 AM. Single user license only Copying and networking prohibited ANSX9.24-1:2009 Tables Table A-1-Variant constants for transaction keys 56 Table A-2 Chronological accesses to Future Key registers 66 Table C-1-Example of Pair-wise XoR Combination of Key components for DEA..............85 C 2009-All rights reserved Licensed to George Jiang. ANSI order X 170098 Downloaded 4/28/201011: 40 AM. Single user license only Copying and networking prohibited ANSX924-1:2009 Introduction Today, billions of dollars in funds are transferred electronically by various communication methods. transactions are often entered remotely, off-premise from financial institutions, by retailers or by customers directly. Such transactions are transmitted over potentially non-secure media. The vast range in value, size, and the volume of such transactions expose institutions to severe risks, which may be uninsurable To protect these financial messages and other sensitive information, many institutions are making increased use of the American National Standards Institute Triple Data Encryption Algorithm(TDEA). Specific examples of its use include standards for message authentication, personal identification number encryption, other data encryption, and key encryption The TDEa is in the public domain. The security and reliability of any process based on the TdEa is directly dependent on the protection afforded to secret numbers called cryptographic keys. This part of this standard deals exclusively with management of symmetric keys using symmetric techniques. ANS X9 24-2 addresses management of symmetric keys using asymmetric techniques a familiar analogy may be found in the combination lock of a vault. The lock design is public knowledge. Security is provided by keeping a number, the combination, a secret. Secure operation also depends on protective procedures and features which prevent surreptitious viewing or determination of the combination by listening to its operation. Procedures are also required to ensure that the combination is random and cannot be modified by an unauthorized individual without detection Suggestions for the improvement of this standard will be welcome. They should be sent to the ASc X9 Secretariat Accredited Standards committee X9, Inc, 1212 West Street, Suite 200, Annapolis, Md 21401 The standard was processed and approved for submittal to the American National Standards Institute by the Accredited Standards Committee X9- Financial Services. Committee approval of the standard does not necessarily imply that all committee members voted for its approval. at the time it approved this standard, the Xg Committee had the following members Roy De Cicco, x9 Chairman Vincent de santis. x9 Vice-Chairman Cynthia Fuller, EXecutive Director Janet Busch, Program Manager Organization Represented Representative ACl Worldwide Grote ACI Worldwide Cind Rink American Bankers association om Judd American bankers association C. Diane poole American Express Company Perc Arriva Sutton Bank of america Andi Coleman Bank of america Daniel Welch Certicom Corporation Daniel Brown Citigroup, Inc Mark Citigroup, Inc Michael Knorr 2009-All rights reserved Licensed to George Jiang. ANSI order X 170098 Downloaded 4/28/201011: 40 AM. Single user license only Copying and networking prohibited ANSX9.24-1:2009 Citigroup, Inc Karla McKenna Citigroup, Chii-Ren sal CUSIP Service Bureau Gerard Faulkner CUSIP Service bureau James Taylor Deluxe Corporation John FitzPatrick Deluxe Corporation Ralph Stolp Diebold. Inc Bruce Chapa Diebold. Inc Anne Konecny Discover financial services Dave Irwin Discover financial services Deana Morrow Federal reserve bank Deb Portland Federal reserve bank Claudia Swendseid First Data Corporation Tod Nuzum First Data Corporation Rick Van lavender Fiser Beattie Misery Kevin Finn Fiery Lori Hood Fiserv Dan Otten Misery Skip Smith FX Protocol ltd Northey Harland clarke John McCleary Hewlett Packard arry Hines Hewlett packard Gary Lefkowitz IBM Corporation Todd Arnold IFSA Dexter Holt IFSA Dan Taylor Ingenico McKibben Ingenico John Spence J. P. Morgan chase co Robert Blair J.P. Morgan Chase Co Roy DeCⅰcco J. P. Morgan Chase& Co Edward Koslow J. P. Morgan chase co Jackie Pagan J. P. Morgan chase co Charita Wamack Key Innovations Scott Spiker Key Innovations Paul Walters KPMG LLP Mark MagTek, Inc e Benson MagTek, Inc Duncan Hart Master Card International Mark Kamers Merchant Advisory Group Dodd Roberts Metavante Image solutions Stephen Gibson -Saxty NACHA The Electronic Payments Association Nancy Grant National association of convenience stores michael davis National association of convenience stores alan Thiemann National Security Agency Paul Simmel NCR Corporation David Norris NCR Corporation Steve Stevens Route One Mark Leonard SWIFT/Pan Americas Jean- Eloy C 2009-All rights reserved Licensed to George Jiang. ANSI order X 170098 Downloaded 4/28/201011: 40 AM. Single user license only Copying and networking prohibited ANSX924-1:2009 Ma SWIFT/Pan americas James SWIFT/Pan Americas Jamie Shay TECSEC Incorporated Ed Scheidt The clearing house Vincent De Santis U.s. Bank Brian Fickling U. S, Bank Gregg Walker University Bank Stephen Ranzini University Bank Michael Talley VeriFone, Ir David Ezell VeriFone Inc Dave Fa aero eriFone, nc Allison Holland VeriFone Inc D oug Manchester VeriFone, Inc Brad McGuinness VeriFone, Inc Brenda Watlington VISA Brian Hamilton VISA John Sheets VISA Richard Sweeney Wells Fargo Bank Andrew Garner Wells Fargo Bank Mike McCormick Wells Fargo Bank Mike Rudolph Wells Fargo Bank Mark Tigges Wincor nixdorf inc Ramesh Arunashalam XBRL US. Inc Mark Bolgiano At the time it approved this standard, the X9F Subcommittee on Data and Information Security had the following mem bers. Dick Sweeney, Chairperson Organization Represented Representative Company First name last name Acl Worldwide Doug Grote ACI Worldwide Julie Samson AcI Worldwide Sid Sidner American Bankers association Tom Judd American Express Company William j Gray American Express Company Vⅰck Sammons Bank of america Dion Bellamy Bank of america Terrelle Carswell Bank of america An Coleman 2009-All rights reserved Licensed to George Jiang. ANSI order X 170098 Downloaded 4/28/201011: 40 AM. Single user license only Copying and networking prohibited 【实例截图】
【核心代码】

标签:

实例下载地址

ANS X9.24-1:2009

不能下载?内容有错? 点击这里报错 + 投诉 + 提问

好例子网口号:伸出你的我的手 — 分享

网友评论

发表评论

(您的评论需要经过审核才能显示)

查看所有0条评论>>

小贴士

感谢您为本站写下的评论,您的评论对其它用户来说具有重要的参考价值,所以请认真填写。

  • 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
  • 相信您也不想看到一排文字/表情墙,所以请不要反馈意义不大的重复字符,也请尽量不要纯表情的回复。
  • 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
  • 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。

关于好例子网

本站旨在为广大IT学习爱好者提供一个非营利性互相学习交流分享平台。本站所有资源都可以被免费获取学习研究。本站资源来自网友分享,对搜索内容的合法性不具有预见性、识别性、控制性,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,平台无法对用户传输的作品、信息、内容的权属或合法性、安全性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论平台是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二与二十三条之规定,若资源存在侵权或相关问题请联系本站客服人员,点此联系我们。关于更多版权及免责申明参见 版权及免责申明

;
报警