ANSI X9.65 : 2004
Current
The latest, up-to-date edition.
TRIPLE DATA ENCRYPTION ALGORITHM (TDEA), IMPLEMENTATION STANDARD
15-01-2004
1 SCOPE
2 NORMATIVE REFERENCES
3 DEFINITIONS
4 SYMBOLS AND ABBREVIATIONS
5 MODE OF OPERATION
5.1 MODES OF OPERATION LIST
5.1.1 Modes of Operation and Usage
5.1.2 Mode and Usage Matrix
5.2 BASIS FOR THE MODES OF OPERATION
5.2.1 TECB, TCBC, TCFB, and TOFB Modes
5.2.2 The -I and -P Modes of Operation
5.2.3 Interleaved Property
5.2.4 Pipelined Property
5.2.5 Backward Compatibility Table
5.3 KEY UTILIZATION
5.4 GENERATION OF TDEA KEY BUNDLE
5.4.1 Generation of TDEA Keys
5.4.2 TDEA Key Bundle
5.5 INTERMEDIATE RESULTS
5.6 TDEA 3 KEY IMPLEMENTATION
5.7 TDEA 2 KEY IMPLEMENTATION
5.8 TDEA SINGLE KEY IMPLEMENTATION
6 IMPLEMENTATION ISSUES
6.1 COLLISION
6.2 STOPPING DICTIONARY ATTACKS IN CBC MODE
6.3 WEAK KEYS
6.4 SINGLE OR MULTIPLE INITIALIZATION VECTORS
6.5 INITIALIZATION VECTORS
6.6 TEST CASES
7 SYMMETRIC AND ASYMMETRIC KEY MANAGEMENT
7.1 SYMMETRIC KEY MANAGEMENT
7.2 SYMMETRIC KEY MANAGEMENT EXTENSION
7.3 ASYMMETRIC KEY MANAGEMENT
7.4 RSA, DIFFIE-HELLMAN, AND ELLIPTIC CURVE TECHNIQUES
7.5 MIXED SYMMETRIC/ASYMMETRIC KEY MANAGEMENT TECHNIQUES
ANNEX A (INFORMATIVE) CRYPTOGRAPHIC BASICS
A.1 SYMMETRIC CRYPTOGRAPHY
A.2 KEY MANAGEMENT
A.3 KEY GENERATION
A.4 GENERATION OF DOUBLE LENGTH KEY COMPONENTS
A.5 KEY DISTRIBUTION
A.6 KEY LOADING
A.7 KEY STORAGE
A.8 KEY USAGE
A.9 KEY RECOVERY
A.10 KEY TERMINATION
A.11 KEY ARCHIVAL
ANNEX B, (INFORMATIVE) TDEA MODES OF OPERATION AND ATTRIBUTES
ANNEX C (INFORMATIVE) EXAMPLES OF CRYPTOGRAPHIC ATTACKS
C.1 KEY ATTACKS
C.2 TEXT ATTACKS
C.2.1 STREAM CIPHER CYCLE LENGTH
C.2.2 TEXT DICTIONARY
C.2.3 MATCHING CIPHERTEXT
ANNEX D (INFORMATIVE) GUIDANCE ON THE AUTHENTICATION OF DATA
ANNEX E (INFORMATIVE) BIBLIOGRAPHY
ANNEX F (INFORMATIVE) DERIVED UNIQUE KEY PER TRANSACTION (DUKPT)
Specifies methodologies for the implementation of Triple Data Encryption Algorithm (TDEA) Modes of Operations for the enhanced cryptographic protection of digital information. The modes of operation are specified for both enciphering and deciphering operations. This standard will assist system integrators to select and implement the appropriate mode for their organizations.
Committee |
X9
|
DocumentType |
Standard
|
PublisherName |
American Bankers Association
|
Status |
Current
|
ANSI X9 TR 39 : 2009 | TG-3 RETAIL FINANCIAL SERVICES COMPLIANCE GUIDELINE - PART 1: PIN SECURITY AND KEY MANAGEMENT |
ANSI X9.110 : 2008(R2013) | FINANCIAL SERVICES - TOLEC - TRANSFER OF LOCATION OF ELECTRONIC CONTRACTS |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
ANSI X9.52 : 1998 | TRIPLE DATA ENCRYPTION ALGORITHM MODES OF OPERATION |
ANSI X9.24-1 : 2017 | RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 1: USING SYMMETRIC TECHNIQUES |
ANSI X9.69 : 2017 | FRAMEWORK FOR KEY MANAGEMENT EXTENSIONS |
ANSI X9.63 : 2011 | FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY |
ANSI X9.42 : 2003(R2013) | PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES: AGREEMENT OF SYMMETRIC KEYS USING DISCRETE LOGARITHM CRYPTOGRAPHY |
ANSI X9.73 : 2017 | CRYPTOGRAPHIC MESSAGE SYNTAX - ASN.1 AND XML |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.