• ANSI X9.42 : 2003(R2013)

    Current The latest, up-to-date edition.

    PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES: AGREEMENT OF SYMMETRIC KEYS USING DISCRETE LOGARITHM CRYPTOGRAPHY

    Available format(s): 

    Language(s): 

    Published date:  12-01-2013

    Publisher:  American Bankers Association

    Sorry this product is not available in your region.

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    1 SCOPE
    2 NORMATIVE REFERENCES
    3 DEFINITIONS
    4 SYMBOLS AND ABBREVIATIONS
      4.1 SYMBOLS
      4.2 ABBREVIATIONS
    5 ORGANIZATION
    6 APPLICATION
    7 BASIC ALGORITHMS, FUNCTIONS, AND CONVERSION RULES
      7.1 DOMAIN PARAMETER GENERATION
      7.2 DOMAIN PARAMETER VALIDATION
      7.3 PRIVATE/PUBLIC KEY GENERATION
      7.4 PUBLIC KEY VALIDATION
      7.5 CALCULATION OF SHARED SECRET ELEMENTS
      7.6 DATA CONVERSION RULES
      7.7 KEY DERIVATION FROM A SHARED SECRET VALUE
      7.8 MAC COMPUTATION
      7.9 ANSI X9.42 IMPLEMENTATION VALIDATION
    8 KEY AGREEMENT SCHEMES
      8.1 KEY AGREEMENT USING THE DIFFIE-HELLMAN ALGORITHM
      8.2 KEY AGREEMENT USING THE MQV ALGORITHM
    ANNEX A (NORMATIVE) PARAMETER SYNTAX AND ENCODING RULES
      A.1 FINITE FIELD SYNTAX
      A.2 PARAMETER SYNTAX
      A.3 PUBLIC KEY SYNTAX
      A.4 SCHEME SYNTAX
      A.5 KEY DERIVATION SYNTAX
      A.6 MAC FOR ANSI X9.42 IMPLEMENTATION VALIDATION
      A.7 ASN.1 MODULE
    ANNEX B (NORMATIVE) DOMAIN PARAMETER GENERATION
      B.1 GENERATION OF PRIME MODULI
      B.2 SELECTION OF A GENERATOR FOR Q-ORDER SUBGROUP
      B.3 JACOBI SYMBOL
    ANNEX C (NORMATIVE) PSEUDO-RANDOM NUMBER GENERATOR
      C.1 PSEUDO-RANDOM NUMBER GENERATOR BASED ON G(T, C)
      C.2 PSEUDO-RANDOM NUMBER GENERATOR USING THE TDEA
    ANNEX D (INFORMATIVE) CALCULATION EXAMPLES
      D.1 GENERATION OF DOMAIN PARAMETERS
      D.2 GENERATION OF PRIVATE/PUBLIC KEYS
      D.3 SHARED SECRET VALUE CALCULATION - USING DIFFIE-HELLMAN
          ALGORITHM
      D.4 SHARED SECRET VALUE CALCULATIONS - USING MQV ALGORITHM
      D.5 KEY DERIVATION FUNCTION
      D.6 MAC COMPUTATION
    ANNEX E (INFORMATIVE) SECURITY CONSIDERATIONS
      E.1 SECURITY OF THE DISCRETE LOGARITHM PROBLEM IN GF(P)
      E.2 SECURITY OF KEY AGREEMENT SCHEMES
      E.3 GUIDELINES ON SELECTING AN ANSI X9.42 KEY AGREEMENT SCHEME
      E.4 GENERAL SECURITY CONSIDERATIONS
    ANNEX F (INFORMATIVE) SUMMARY OF CHANGES FROM ANS X9.42-2001
      F.1 TECHNICAL ISSUES
      F.2 EDITORIAL ISSUES
    ANNEX G (INFORMATIVE) REFERENCES
    TABLES

    Abstract - (Show below) - (Hide below)

    Describes schemes for the agreement of symmetric keys using Diffie-Hellman and MQV algorithms. It covers methods of domain parameter generation, domain parameter validation, key pair generation, public key validation, shared secret value calculation, key derivation, and test message authentication code computation for discrete logarithm problem based key agreement schemes.

    General Product Information - (Show below) - (Hide below)

    Committee X9
    Document Type Standard
    Publisher American Bankers Association
    Status Current

    Standards Referenced By This Book - (Show below) - (Hide below)

    13/30257954 DC : 0 BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
    ANSI X9.98 : 2010(R2017) FINANCIAL SERVICES - LATTICE-BASED POLYNOMIAL PUBLIC KEY ESTABLISHMENT ALGORITHM FOR THE FINANCIAL SERVICES INDUSTRY
    BS IEC 62055-41:2014 Electricity metering. Payment systems Standard transfer specification (STS). Application layer protocol for one-way token carrier systems
    ANSI X9.96 : 2004 FINANCIAL SERVICES - XML CRYPTOGRAPHIC MESSAGE SYNTAX (XCMS)
    BS EN 14890-1:2008 Application interface for smart cards used as secure signature creation devices Basic services
    BS ISO/IEC 15946-3:2002 Information technology. Security techniques. Cryptographic techniques based on elliptic curves Key establishment
    INCITS/ISO/IEC 15946-3 : 2002 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT
    IEEE 1363.3-2013 IEEE Standard for Identity-Based Cryptographic Techniques using Pairings
    IEEE 1363.2 : 2008 SPECIFICATION FOR PASSWORD-BASED PUBLIC-KEY CRYPTOGRAPHIC TECHNIQUES
    BIS IS 15256-4 : 2013 BANKING - KEY MANAGEMENT (RETAIL) - PART 4: ASYMMETRIC CRYPTOSYSTEMS - KEY MANAGEMENT AND LIFE CYCLE
    ANSI X9.44 : 2007 FINANCIAL SERVICES - PUBLIC-KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - KEY ESTABLISHMENT USING INTEGER FACTORIZATION CRYPTOGRAPHY
    ASTM E 2085 : 2000 : REV A Standard Guide on Security Framework for Healthcare Information (Withdrawn 2009)
    16/30335156 DC : 0 BS EN 14615 - POSTAL SERVICES - DIGITAL POSTAGE MARKS - APPLICATIONS, SECURITY AND DESIGN
    13/30284056 DC : 0 BS EN 62055-41 - ELECTRICITY METERING - PAYMENT SYSTEMS - PART 41: STANDARD TRANSFER SPECIFICATION (STS) - APPLICATION LAYER PROTOCOL FOR ONE-WAY TOKEN CARRIER SYSTEMS
    03/103592 DC : DRAFT MAR 2003 BS EN 14615 - POSTAL SERVICES - AUTOMATED PROCESSING OF MAIL ITEMS - DIGITAL POSTAGE MARKS
    BS ISO/IEC 18367:2016 Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing
    02/648262 DC : DRAFT JUN 2002 ISO/IEC FCD 7816-15 - INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 15: CRYPTOGRAPHIC INFORMATION APPLICATION
    ANSI X9 TR 39 : 2009 TG-3 RETAIL FINANCIAL SERVICES COMPLIANCE GUIDELINE - PART 1: PIN SECURITY AND KEY MANAGEMENT
    CAN/CSA-ISO/IEC 18367:18 Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15)
    I.S. EN 14890-1:2008 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    ISO/IEC 18367:2016 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing
    IEC 62055-41:2014 RLV Electricity metering – Payment systems – Part 41: Standard transfer specification (STS) – Application layer protocol for one-way token carrier systems
    CSA ISO/IEC 15946-3 : 2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT
    14/30293056 DC : 0 BS ISO/IEC 7816-15 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PART 15: CRYPTOGRAPHIC INFORMATION APPLICATION
    BS ISO 11568-4:2007 Banking. Key management (retail) Asymmetric cryptosystems. Key management and life cycle
    DIN EN 14890-1:2009-03 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    07/30161079 DC : 0 BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    12/30255293 DC : 0 BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    BS ISO/IEC 11770-3 : 2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
    UNI EN 419212-1 : 2015 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    ANSI X9.65 : 2004 TRIPLE DATA ENCRYPTION ALGORITHM (TDEA), IMPLEMENTATION STANDARD
    15/30279582 DC : 0 BS ISO/IEC 18367 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC ALGORITHMS AND SECURITY MECHANISMS CONFORMANCE TESTING
    DIN EN 14890-1 E : 2009 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    ANSI X9/TG-3 : 2006 RETAIL FINANCIAL SERVICES COMPLIANCE GUIDELINE - ONLINE PIN SECURITY AND KEY MANAGEMENT
    EN 14890-1:2008 Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services
    CAN/CSA-ISO/IEC 11770-3:16 Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques (Adopted ISO/IEC 11770-3:2015, third edition, 2015-08-01)
    07/30161232 DC : 0 BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
    INCITS/ISO/IEC 7816-15 : 2004 IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS WITH CONTACTS - PART 15: CRYPTOGRAPHIC INFORMATION APPLICATION
    IEC 62055-41:2018 RLV Electricity metering - Payment systems - Part 41: Standard transfer specification (STS) - Application layer protocol for one-way token carrier systems
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    ISO/IEC 15946-3:2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 3: Key establishment
    ISO 11568-4:2007 Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
    IEC 62055-41 REDLINE : 3ED 2018 ELECTRICITY METERING - PAYMENT SYSTEMS - PART 41: STANDARD TRANSFER SPECIFICATION (STS) - APPLICATION LAYER PROTOCOL FOR ONE-WAY TOKEN CARRIER SYSTEMS

    Standards Referencing This Book - (Show below) - (Hide below)

    ANSI X9.30.1 : 1997 PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - PART 1: THE DIGITAL SIGNATURE ALGORITHM (DSA)
    ANSI X9.57 : 1997 PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY: CERTIFICATE MANAGEMENT
    ANSI X9.80 : 2005(R2013) PRIME NUMBER GENERATION, PRIMALITY TESTING, AND PRIMALITY CERTIFICATES
    ISO/IEC 8825-2:2015 Information technology ASN.1 encoding rules: Specification of Packed Encoding Rules (PER) Part 2:
    ANSI X9/TG-9 : 1995 ABSTRACT SYNTAX NOTATION AND ENCODING RULES FOR FINANCIAL INDUSTRY STANDARDS
    ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
    ANSI X9.52 : 1998 TRIPLE DATA ENCRYPTION ALGORITHM MODES OF OPERATION
    ISO/IEC 8824-2:2015 Information technology Abstract Syntax Notation One (ASN.1): Information object specification Part 2:
    ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
    ANSI X9.71 : 2000 KEYED HASH MESSAGE AUTHENTICATION CODE (MAC)
    ISO/IEC 8824-4:2015 Information technology Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications Part 4:
    ISO/IEC 8824-1:2015 Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Part 1:
    ANSI INCITS 92 : 1981 DATA ENCRYPTION ALGORITHM
    ANSI X9.17 : 1995 FINANCIAL INSTITUTION KEY MANAGEMENT (WHOLESALE),
    ANSI X9.30.2 : 1997 PUBLIC KEY CRYPTOGRAPHY USING IRREVERSIBLE ALGORITHMS - PART 2: THE SECURE HASH ALGORITHM (SHA-1)
    ISO/IEC 8824-3:2015 Information technology Abstract Syntax Notation One (ASN.1): Constraint specification Part 3:
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective