ANSI X9.63 : 2011
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY
01-01-2017
30-04-2024
X9 MEMBER ORGANIZATION REPRESENTATIVE
X9F MEMBER ORGANIZATION REPRESENTATIVE
X9F1 MEMBER ORGANIZATION REPRESENTATIVE
1 SCOPE
2 DEFINITIONS, ABBREVIATIONS AND REFERENCES
3 APPLICATION
4 MATHEMATICAL CONVENTIONS
5 CRYPTOGRAPHIC INGREDIENTS
6 KEY AGREEMENT SCHEMES
7 KEY TRANSPORT SCHEMES
ANNEX A (NORMATIVE) - NORMATIVE NUMBER-THEORETIC
ALGORITHMS
ANNEX B (INFORMATIVE) - MATHEMATICAL BACKGROUND
ANNEX C (INFORMATIVE) - TABLES OF TRINOMIALS,
PENTANOMIALS, AND GAUSSIAN NORMAL BASES
ANNEX D (INFORMATIVE) - INFORMATIVE NUMBER-THEORETIC
ALGORITHMS
ANNEX E (INFORMATIVE) - COMPLEX MULTIPLICATION
(CM) ELLIPTIC CURVE GENERATION METHOD
ANNEX F (INFORMATIVE) - SECURITY CONSIDERATIONS
ANNEX G (INFORMATIVE) - EXAMPLES
ANNEX H (INFORMATIVE) - ASN.1
ANNEX I (NORMATIVE) - LEGACY SCHEMES
ANNEX J (INFORMATIVE) - BIBLIOGRAPHY
Describes key establishment schemes that employ asymmetric cryptographic techniques.
| Committee |
X9
|
| DocumentType |
Standard
|
| PublisherName |
American Bankers Association
|
| Status |
Superseded
|
| SupersededBy |
| ISO/IEC/IEEE 8802-22:2015 | Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands |
| ANSI X9.98 : 2010(R2017) | FINANCIAL SERVICES - LATTICE-BASED POLYNOMIAL PUBLIC KEY ESTABLISHMENT ALGORITHM FOR THE FINANCIAL SERVICES INDUSTRY |
| ANSI X9.80 : 2005(R2013) | PRIME NUMBER GENERATION, PRIMALITY TESTING, AND PRIMALITY CERTIFICATES |
| 07/30135624 DC : 0 | BS ISO/IEC 15946-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 1: GENERAL |
| BS ISO/IEC 9796-3:2006 | Information technology. Security techniques. Digital signature schemes giving message recovery Discrete logarithm based mechanisms |
| ANSI INCITS 467 : 2011 | INFORMATION TECHNOLOGY - SCSI STREAM COMMANDS - 3 (SSC-3) |
| ANSI X9.96 : 2004 | FINANCIAL SERVICES - XML CRYPTOGRAPHIC MESSAGE SYNTAX (XCMS) |
| INCITS/ISO/IEC 15946-2 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 2: DIGITAL SIGNATURES |
| PD CEN/TS 15480-2:2012 | Identification card systems. European Citizen Card Logical data structures and security services |
| BS ISO/IEC 15946-3:2002 | Information technology. Security techniques. Cryptographic techniques based on elliptic curves Key establishment |
| INCITS/ISO/IEC 15946-3 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
| IEEE 1363.3-2013 | IEEE Standard for Identity-Based Cryptographic Techniques using Pairings |
| I.S. EN 62734:2015 | INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
| S.R. CEN/TS 15480-2:2012 | IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 2: LOGICAL DATA STRUCTURES AND SECURITY SERVICES |
| ANSI X9.44:2007 | FINANCIAL SERVICES - PUBLIC-KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - KEY ESTABLISHMENT USING INTEGER FACTORIZATION CRYPTOGRAPHY |
| EN 62734:2015 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
| CEN/TS 15480-2:2012 | Identification card systems - European Citizen Card - Part 2: Logical data structures and security services |
| 12/30259506 DC : DRAFT JAN 2012 | BS EN 62734 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS (BASED ON ISA 100.11A) |
| ANSI INCITS 516 : 2013(R2018) | INFORMATION TECHNOLOGY - SCSI STREAM COMMANDS - 4 (SSC-4) |
| 02/652466 DC : DRAFT MAY 2002 | ISO/IEC FCD 15946-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 4: DIGITAL SIGNATURES GIVING MESSAGE RECOVERY |
| 15/30318285 DC : 0 | BS ISO/IEC 15946-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 1: GENERAL |
| ANSI X9 TR 39 : 2009 | TG-3 RETAIL FINANCIAL SERVICES COMPLIANCE GUIDELINE - PART 1: PIN SECURITY AND KEY MANAGEMENT |
| DD CEN/TS 15480-2:2007 | Identification card systems. European Citizen Card Logical data structures and card services |
| BS ISO/IEC 15946-1:2016 | Information technology. Security techniques. Cryptographic techniques based on elliptic curves General |
| ANSI X9.92-1 : 2009 | PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - DIGITAL SIGNATURE ALGORITHMS GIVING PARTIAL MESSAGE RECOVERY - PART 1: ELLIPTIC CURVE PINTSOV-VANSTONE SIGNATURES (ECPVS) |
| S.R. CEN/TS 15480-3:2014 | IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 3: EUROPEAN CITIZEN CARD INTEROPERABILITY USING AN APPLICATION INTERFACE |
| ARINC 823-1 : 2007 | DATALINK SECURITY - PART 1: ACARS MESSAGE SECURITY |
| ISO/IEC 15946-4:2004 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 4: Digital signatures giving message recovery |
| BS ISO/IEC/IEEE 8802-22:2015 | Information technology. Telecommunications and information exchange between systems. Local and metropolitan area networks. Specific requirements Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands |
| PD CEN/TS 15480-3:2014 | Identification card systems. European Citizen Card European Citizen Card Interoperability using an application interface |
| BS ISO/IEC 15946-4:2004 | Information technology. Security techniques. Cryptographic techniques based on elliptic curves Digital signatures giving message recovery |
| 10/30218910 DC : 0 | BS ISO/IEC IEEE 8802-15-4 - INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - LOCAL AND METROPOLITAN AREA NETWORKS - SPECIFIC REQUIREMENTS - PART 15-4: WIRELESS MEDIUM ACCESS CONTROL (MAC) AND PHYSICAL LAYER (PHY) SPECIFICATIONS FOR LOW-RATE WIRELESS PERSONAL AREA NETWORKS (WPANS) |
| 07/30161079 DC : 0 | BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
| INCITS/ISO/IEC 15946-1 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 1: GENERAL |
| BS ISO/IEC 11770-3 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| IEC 62734:2014 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
| ANSI X9.65 : 2004 | TRIPLE DATA ENCRYPTION ALGORITHM (TDEA), IMPLEMENTATION STANDARD |
| 04/30117200 DC : DRAFT DEC 2004 | ISO/IEC 9796-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
| BS EN 62734:2015 | Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
| ISO/IEC 9796-3:2006 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms |
| 07/30161082 DC : 0 | BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
| ANSI X9/TG-3 : 2006 | RETAIL FINANCIAL SERVICES COMPLIANCE GUIDELINE - ONLINE PIN SECURITY AND KEY MANAGEMENT |
| ISO/IEC 14776-333:2013 | Information technology — Small Computer System Interface (SCSI) — Part 333: SCSI Stream Commands - 3 (SSC-3) |
| IEC PAS 62734:2012 | Industrial communication networks - Fieldbus specifications - Wireless systems for industrial automation: process control and related applications |
| PD IEC/PAS 62734:2012 | Industrial communication networks. Fieldbus specifications. Wireless systems for industrial automation: process control and related applications |
| IEEE 802.15.4-2011 | IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) |
| 13/30257954 DC : 0 | BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| DD CEN/TS 15480-3:2010 | Identification card systems. European citizen card European citizen card interoperability using an application interface |
| BS ISO/IEC 15946-2:2002 | Information technology. Security techniques. Cryptographic techniques based on elliptic curves Digital signatures |
| 07/30161232 DC : 0 | BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| IEEE 802.22-2011 | IEEE Standard for Information technology-- Local and metropolitan area networks-- Specific requirements-- Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Policies and procedures for operation in the TV Bands |
| ISO/IEC/IEEE 8802-15-4:2018 | Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 15-4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (WPANs) |
| ISO/IEC 15946-2:2002 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 2: Digital signatures |
| ISO/IEC 11770-3:2015 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques |
| ISO/IEC 15946-1:2016 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General |
| ISO/IEC 15946-3:2002 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 3: Key establishment |
| CEN/TS 15480-3:2014 | Identification card systems - European Citizen Card - Part 3: European Citizen Card Interoperability using an application interface |
| ANSI X9.84 : 2010(R2017) | BIOMETRIC INFORMATION MANAGEMENT AND SECURITY FOR THE FINANCIAL SERVICES INDUSTRY |
| ANSI X9.82-3 : 2007(R2017) | RANDOM NUMBER GENERATION - PART 3: DETERMINISTIC RANDOM BIT GENERATORS |
| ISA 100.11A : 2011 | WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS |
| ANSI X9.79-4 : 2013 | PUBLIC KEY INFRASTRUCTURE (PKI) - PART 4: ASYMMETRIC KEY MANAGEMENT |
| ANSI X9.82-1 : 2006(R2013) | RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES |
| ISO/IEC 8825-2:2015 | Information technology — ASN.1 encoding rules: Specification of Packed Encoding Rules (PER) — Part 2: |
| ISO/IEC 8825-1:2015 | Information technology — ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) — Part 1: |
| ISO/IEC 8824-2:2015 | Information technology — Abstract Syntax Notation One (ASN.1): Information object specification — Part 2: |
| ISO/IEC 8824-4:2015 | Information technology — Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications — Part 4: |
| ISO/IEC 8824-1:2015 | Information technology — Abstract Syntax Notation One (ASN.1): Specification of basic notation — Part 1: |
| ISO/IEC 8824-3:2015 | Information technology — Abstract Syntax Notation One (ASN.1): Constraint specification — Part 3: |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.