• There are no items in your cart

ANSI X9.65 : 2004

Current

Current

The latest, up-to-date edition.

TRIPLE DATA ENCRYPTION ALGORITHM (TDEA), IMPLEMENTATION STANDARD

Published date

15-01-2004

Sorry this product is not available in your region.

1 SCOPE
2 NORMATIVE REFERENCES
3 DEFINITIONS
4 SYMBOLS AND ABBREVIATIONS
5 MODE OF OPERATION
  5.1 MODES OF OPERATION LIST
      5.1.1 Modes of Operation and Usage
      5.1.2 Mode and Usage Matrix
  5.2 BASIS FOR THE MODES OF OPERATION
      5.2.1 TECB, TCBC, TCFB, and TOFB Modes
      5.2.2 The -I and -P Modes of Operation
      5.2.3 Interleaved Property
      5.2.4 Pipelined Property
      5.2.5 Backward Compatibility Table
  5.3 KEY UTILIZATION
  5.4 GENERATION OF TDEA KEY BUNDLE
      5.4.1 Generation of TDEA Keys
      5.4.2 TDEA Key Bundle
  5.5 INTERMEDIATE RESULTS
  5.6 TDEA 3 KEY IMPLEMENTATION
  5.7 TDEA 2 KEY IMPLEMENTATION
  5.8 TDEA SINGLE KEY IMPLEMENTATION
6 IMPLEMENTATION ISSUES
  6.1 COLLISION
  6.2 STOPPING DICTIONARY ATTACKS IN CBC MODE
  6.3 WEAK KEYS
  6.4 SINGLE OR MULTIPLE INITIALIZATION VECTORS
  6.5 INITIALIZATION VECTORS
  6.6 TEST CASES
7 SYMMETRIC AND ASYMMETRIC KEY MANAGEMENT
  7.1 SYMMETRIC KEY MANAGEMENT
  7.2 SYMMETRIC KEY MANAGEMENT EXTENSION
  7.3 ASYMMETRIC KEY MANAGEMENT
  7.4 RSA, DIFFIE-HELLMAN, AND ELLIPTIC CURVE TECHNIQUES
  7.5 MIXED SYMMETRIC/ASYMMETRIC KEY MANAGEMENT TECHNIQUES
ANNEX A (INFORMATIVE) CRYPTOGRAPHIC BASICS
      A.1 SYMMETRIC CRYPTOGRAPHY
      A.2 KEY MANAGEMENT
      A.3 KEY GENERATION
      A.4 GENERATION OF DOUBLE LENGTH KEY COMPONENTS
      A.5 KEY DISTRIBUTION
      A.6 KEY LOADING
      A.7 KEY STORAGE
      A.8 KEY USAGE
      A.9 KEY RECOVERY
      A.10 KEY TERMINATION
      A.11 KEY ARCHIVAL
ANNEX B, (INFORMATIVE) TDEA MODES OF OPERATION AND ATTRIBUTES
ANNEX C (INFORMATIVE) EXAMPLES OF CRYPTOGRAPHIC ATTACKS
      C.1 KEY ATTACKS
      C.2 TEXT ATTACKS
          C.2.1 STREAM CIPHER CYCLE LENGTH
          C.2.2 TEXT DICTIONARY
          C.2.3 MATCHING CIPHERTEXT
ANNEX D (INFORMATIVE) GUIDANCE ON THE AUTHENTICATION OF DATA
ANNEX E (INFORMATIVE) BIBLIOGRAPHY
ANNEX F (INFORMATIVE) DERIVED UNIQUE KEY PER TRANSACTION (DUKPT)

Specifies methodologies for the implementation of Triple Data Encryption Algorithm (TDEA) Modes of Operations for the enhanced cryptographic protection of digital information. The modes of operation are specified for both enciphering and deciphering operations. This standard will assist system integrators to select and implement the appropriate mode for their organizations.

Committee
X9
DocumentType
Standard
PublisherName
American Bankers Association
Status
Current

ANSI X9 TR 39 : 2009 TG-3 RETAIL FINANCIAL SERVICES COMPLIANCE GUIDELINE - PART 1: PIN SECURITY AND KEY MANAGEMENT
ANSI X9.110 : 2008(R2013) FINANCIAL SERVICES - TOLEC - TRANSFER OF LOCATION OF ELECTRONIC CONTRACTS

ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
ANSI X9.52 : 1998 TRIPLE DATA ENCRYPTION ALGORITHM MODES OF OPERATION
ANSI X9.24-1 : 2017 RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 1: USING SYMMETRIC TECHNIQUES
ANSI X9.69 : 2017 FRAMEWORK FOR KEY MANAGEMENT EXTENSIONS
ANSI X9.63 : 2011 FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY
ANSI X9.42 : 2003(R2013) PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES: AGREEMENT OF SYMMETRIC KEYS USING DISCRETE LOGARITHM CRYPTOGRAPHY
ANSI X9.73 : 2017 CRYPTOGRAPHIC MESSAGE SYNTAX - ASN.1 AND XML

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.