• Shopping Cart
    There are no items in your cart

ANSI X9.52 : 1998

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

TRIPLE DATA ENCRYPTION ALGORITHM MODES OF OPERATION

Withdrawn date

23-07-2013

Published date

12-01-2013

Sorry this product is not available in your region.

Foreword
American National Standards Institute
1 Scope
2 Normative References
3 Definitions
4 Symbols and Abbreviations
5 Organization
6 Specifications
6.1 TDEA Encryption/Decryption Operation
6.2 Keying Options
6.3 TDEA Modes of Operation
6.4 Backward Compatibility
6.5 Schedule of DEA Functional Blocks
6.6 Improving Throughout and Minimizing Propagation
6.7 Keys and Initialization Vectors
6.8 Input and Output
7 TDEA Modes of Operation
7.1 TDEA Electronic Codebook Mode of Operation
7.1.1 TECB Definition
7.1.2 TECB Properties
7.2 TDEA Cipher Block Chaining Mode of Operation
7.2.1 TCBC Definition
7.2.2 TCBC Properties
7.3 TDEA Cipher Block Chaining Mode of Operation - Interleaved
7.3.1 TCBC-I Definition
7.3.2 TCBC-I Properties
7.4 TDEA Cipher Feedback Mode of Operation
7.4.1 TCFB Definition
7.4.2 TCFB Properties
7.5 TDEA Cipher Feedback Mode of Operation - Pipelined
7.5.1 TCFB-P Definition
7.5.2 TCFB-P Properties
7.6 TDEA Output Feedback Mode of Operation
7.6.1 TOFB Definition
7.6.2 TOFB Properties
7.7 TDEA Output Feedback Mode of Operation - Interleaved
7.7.1 TOFB-I Definition
7.7.2 TOFB-I Properties
Annex A ASN.1 Syntax for TDEA Modes of Operation (normative)
A.1 Overview
A.2 Syntax for TDEA Modes of Operations
A.3 Object Identifiers
A.4 Supporting Definitions
A.5 ASN.1 Module
Annex B TDEA Modes of Operation Cryptographic Attributes (informative)
B.1 Mode of Operation
B.2 Key Attacks
B.3 Text Attacks
B.3.1 Stream Cipher Cycle Length
B.3.2 Text Dictionary
B.3.3 Matching Ciphertext
B.4 Guidance on the Authentication of Data
Annex C Examples of TDEA Modes of Operation (informative)
C.1 TDEA Electronic Codebook Mode (TECB)
C.1.1 TECB Encryption
C.1.2 TECB Decryption
C.2 TDEA Cipher Block Chaining Mode (TCBC)
C.2.1 TCBC Encryption
C.2.2 TCBC Decryption
C.3 TDEA Cipher Block Chaining Mode - Interleaved (TCBC-I)
C.3.1 TCBC-I Encryption
C.3.2 TCBC-I Decryption
C.4 TDEA Cipher Feedback Mode (TCFB)
C.4.1 TCFB1
C.4.2 TCFB8
C.4.3 TCFB64
C.5 TDEA Cipher Feedback Mode - Pipelined (TCFB-P)
C.5.1 TCFB1-P
C.5.2 TCFB8-P
C.5.3 TCFB64-P
C.6 TDEA Output Feedback Mode (TOFB)
C.6.1 TOFB Encryption
C.6.2 TOFB Decryption
C.7 TDEA Output Feedback Mode - Interleaved (TOFB-I)
C.7.1 TOFB-I Encryption
C.7.2 TOFB-I Decryption

Specifies the Triple Data Encryption Algorithm (TDEA) modes of operation for the enhanced cryptographic protection of digital data. Modes of operation are specified for both deciphering and enciphering operations, and are based on three-fold compound operations of encryption and decryption using ANSI X3.92 Data Encryption Algorithm (DEA). TDEA may be implemented in hardware, software, or a combination of both. The TDEA modes of operation may be used in both wholesale and retail financial applications. For use with other ANSI X9 standards using DEA.

Committee
X9
DocumentType
Standard
PublisherName
American Bankers Association
Status
Withdrawn

ISO/IEC 24824-3:2008 Information technology Generic applications of ASN.1: Fast infoset security Part 3:
ANSI X9.98 : 2010(R2017) FINANCIAL SERVICES - LATTICE-BASED POLYNOMIAL PUBLIC KEY ESTABLISHMENT ALGORITHM FOR THE FINANCIAL SERVICES INDUSTRY
BS IEC 62055-41:2014 Electricity metering. Payment systems Standard transfer specification (STS). Application layer protocol for one-way token carrier systems
12/30268705 DC : 0 BS EN 15509 - ELECTRONIC FEE COLLECTION - INTEROPERABILITY APPLICATION PROFILE FOR DSRC
IEEE 1076-2008 REDLINE IEEE Standard VHDL Language Reference Manual
INCITS/ISO/IEC 18033-3 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 3: BLOCK CIPHERS
IEEE 1363.3-2013 IEEE Standard for Identity-Based Cryptographic Techniques using Pairings
BS IEC 61691-1-1:2011 Behavioural languages VHDL Language reference manual
ANSI X9.44:2007 FINANCIAL SERVICES - PUBLIC-KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - KEY ESTABLISHMENT USING INTEGER FACTORIZATION CRYPTOGRAPHY
ASTM E 2085 : 2000 : REV A Standard Guide on Security Framework for Healthcare Information (Withdrawn 2009)
CEN/TS 15130:2006 Postal services - DPM infrastructure - Messages supporting DPM applications
DD CEN/TS 15130:2006 Postal services. DPM infrastructure. Messages supporting DPM applications
16/30335156 DC : 0 BS EN 14615 - POSTAL SERVICES - DIGITAL POSTAGE MARKS - APPLICATIONS, SECURITY AND DESIGN
BS ISO/IEC 18033-3:2010 Information technology. Security techniques. Encryption algorithms Block ciphers
13/30284056 DC : 0 BS EN 62055-41 - ELECTRICITY METERING - PAYMENT SYSTEMS - PART 41: STANDARD TRANSFER SPECIFICATION (STS) - APPLICATION LAYER PROTOCOL FOR ONE-WAY TOKEN CARRIER SYSTEMS
03/103592 DC : DRAFT MAR 2003 BS EN 14615 - POSTAL SERVICES - AUTOMATED PROCESSING OF MAIL ITEMS - DIGITAL POSTAGE MARKS
DD ISO/TS 25237:2008 Health informatics. Pseudonymization
ANSI X9 TR 39 : 2009 TG-3 RETAIL FINANCIAL SERVICES COMPLIANCE GUIDELINE - PART 1: PIN SECURITY AND KEY MANAGEMENT
ANSI X9.92-1 : 2009 PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - DIGITAL SIGNATURE ALGORITHMS GIVING PARTIAL MESSAGE RECOVERY - PART 1: ELLIPTIC CURVE PINTSOV-VANSTONE SIGNATURES (ECPVS)
IEC 62055-41:2014 RLV Electricity metering – Payment systems – Part 41: Standard transfer specification (STS) – Application layer protocol for one-way token carrier systems
IEC 62530:2011 SystemVerilog - Unified Hardware Design, Specification, and Verification Language
NEMA PS3.3 : 2017A DIGITAL IMAGING AND COMMUNICATIONS IN MEDICINE (DICOM) - PART 3: INFORMATION OBJECT DEFINITIONS
NEMA PS 3.15 : 2017A DIGITAL IMAGING AND COMMUNICATIONS IN MEDICINE (DICOM) - PART 15: SECURITY AND SYSTEM MANAGEMENT PROFILES
IEEE 1800-2012 IEEE Standard for SystemVerilog--Unified Hardware Design, Specification, and Verification Language
15/30285708 DC : 0 BS EN ISO 25237 - HEALTH INFORMATICS - PSEUDONYMISATION
TR 170 002 : 3.1.1 PROJECT MESA; SERVICE SPECIFICATION GROUP - SERVICES AND APPLICATIONS; DEFINITIONS, SYMBOLS AND ABBREVIATIONS
04/30040721 DC : DRAFT JUL 2004 ISO/IEC 18033-3 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 3: BLOCK CIPHERS
BS EN 14615:2017 Postal services. Digital postage marks. Applications, security and design
ANSI X9.112-1 : 2009 WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS
I.S. EN ISO 25237:2017 HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017)
I.S. EN 14615:2017 POSTAL SERVICES - DIGITAL POSTAGE MARKS - APPLICATIONS, SECURITY AND DESIGN
ANSI X9.110 : 2008(R2013) FINANCIAL SERVICES - TOLEC - TRANSFER OF LOCATION OF ELECTRONIC CONTRACTS
ANSI X9.112 : 2016 WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS
ISO/TR 19038:2005 Banking and related financial services Triple DEA Modes of operation Implementation guidelines
ISO/TR 13569:2005 Financial services Information security guidelines
EN 16312:2013 Intelligent transport systems - Automatic Vehicle and Equipment Registration (AVI/AEI) - Interoperable application profile for AVI/AEI and Electronic Register Identification using dedicated short range communication
I.S. EN 16312:2013 INTELLIGENT TRANSPORT SYSTEMS - AUTOMATIC VEHICLE AND EQUIPMENT REGISTRATION (AVI/AEI) - INTEROPERABLE APPLICATION PROFILE FOR AVI/AEI AND ELECTRONIC REGISTER IDENTIFICATION USING DEDICATED SHORT RANGE COMMUNICATION
ANSI X9.65 : 2004 TRIPLE DATA ENCRYPTION ALGORITHM (TDEA), IMPLEMENTATION STANDARD
BS EN 16312:2013 Intelligent transport systems. Automatic Vehicle and Equipment Registration (AVI/AEI). Interoperable application profile for AVI/AEI and Electronic Register Identification using dedicated short range communication
ANSI X9/TG-19-1 : 1999 MODES OF OPERATION VALIDATION SYSTEM FOR THE TRIPLE DATA ENCRYPTION ALGORITHM (TMOVS): REQUIREMENTS AND PROCEDURES
PREN 15509 : DRAFT 2012 ELECTRONIC FEE COLLECTION - INTEROPERABILITY APPLICATION PROFILE FOR DSRC
I.S. CEN TS 15130:2006 POSTAL SERVICES - DPM INFRASTRUCTURE - MESSAGES SUPPORTING DPM APPLICATIONS
IEEE 1364-2005 IEEE Standard for Verilog Hardware Description Language
GS QKD 008 : 1.1.1 QUANTUM KEY DISTRIBUTION (QKD); QKD MODULE SECURITY SPECIFICATION
ISO/TS 25237:2008 Health informatics Pseudonymization
ANSI X9/TG-3 : 2006 RETAIL FINANCIAL SERVICES COMPLIANCE GUIDELINE - ONLINE PIN SECURITY AND KEY MANAGEMENT
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
I.S. CWA 14722-4:2004 EMBEDDED FINANCIAL TRANSACTIONAL IC CARD READER (EMBEDDED FINREAD) - PART 4: TECHNICAL ARCHITECTURE AND DEFINITION OF APIS (APPLICATION PROGRAMMING INTERFACE)
ISO 25237:2017 Health informatics — Pseudonymization
EN ISO 25237:2017 Health informatics - Pseudonymization (ISO 25237:2017)
EN 14615:2017 Postal services - Digital postage marks - Applications, security and design
PD ISO/TR 13569:2005 Financial services. Information security guidelines
IEC 61691-1-1:2011 Behavioural languages - Part 1-1: VHDL Language Reference Manual
BS IEC 62530:2011 SystemVerilog. Unified hardware design, specification, and verification language
BS EN ISO 25237:2017 Health informatics. Pseudonymization
I.S. CWA 14722-3:2004 EMBEDDED FINANCIAL TRANSACTIONAL IC CARD READER (EMBEDDED FINREAD) - PART 3: FUNCTIONAL AND SECURITY SPECIFICATIONS
ANSI X9.42 : 2003(R2013) PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES: AGREEMENT OF SYMMETRIC KEYS USING DISCRETE LOGARITHM CRYPTOGRAPHY
SCTE 201 : 2013 OPEN MEDIA SECURITY (OMS) ROOT KEY DERIVATION PROFILES AND TEST VECTORS
IEC 62055-41:2018 RLV Electricity metering - Payment systems - Part 41: Standard transfer specification (STS) - Application layer protocol for one-way token carrier systems
ANSI X9 TR 31 : 2010 INTEROPERABLE SECURE KEY EXCHANGE KEY BLOCK SPECIFICATION FOR SYMMETRIC ALGORITHMS
DIN EN ISO 25237:2015-10 (Draft) HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017)
UNI EN 16312 : 2013 INTELLIGENT TRANSPORT SYSTEMS - AUTOMATIC VEHICLE AND EQUIPMENT REGISTRATION (AVI/AEI) - INTEROPERABLE APPLICATION PROFILE FOR AVI/AEI AND ELECTRONIC REGISTER IDENTIFICATION USING DEDICATED SHORT RANGE COMMUNICATION
I.S. CWA 14174-3:2004 FINANCIAL TRANSACTIONAL IC CARD READER (FINREAD) - PART 3: SECURITY REQUIREMENTS
ANSI X9.84 : 2010(R2017) BIOMETRIC INFORMATION MANAGEMENT AND SECURITY FOR THE FINANCIAL SERVICES INDUSTRY
ANSI X9.82-3 : 2007(R2017) RANDOM NUMBER GENERATION - PART 3: DETERMINISTIC RANDOM BIT GENERATORS
CSA ISO/IEC 18033-3:2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 3: BLOCK CIPHERS
ANSI X9.82-1 : 2006(R2013) RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES
CAN/CSA-ISO/IEC 18033-3:12 (R2016) Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers (Adopted ISO/IEC 18033-3:2010, second edition, 2010-12-15)

ISO 8372:1987 Information processing Modes of operation for a 64-bit block cipher algorithm
ANSI INCITS 92 : 1981 DATA ENCRYPTION ALGORITHM
ANSI INCITS 106 : 1983 INFORMATION SYSTEMS - DATA ENCRYPTION ALGORITHM - MODES OF OPERATION

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.