ANSI X9.97-2 : 2009(R2017)
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
BANKING - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 2: SECURITY COMPLIANCE CHECKLISTS FOR DEVICES USED IN FINANCIAL TRANSACTIONS
05-09-2024
12-01-2013
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Use of security compliance checklists
Annex A (normative) - Physical, logical and device management
characteristics common to all secure
cryptographic devices
Annex B (normative) - Devices with PIN entry functionality
Annex C (normative) - Devices with PIN management functionality
Annex D (normative) - Devices with message authentication
functionality
Annex E (normative) - Devices with key generation functionality
Annex F (normative) - Devices with key transfer and loading
functionality
Annex G (normative) - Devices with digital signature
functionality
Annex H (normative) - Categorization of environments
Bibliography
Describes checklists to be used to evaluate secure cryptographic devices (SCDs) incorporating cryptographic processes, as specified in parts 1 and 2 of ISO 9564, ISO 16609 and parts 1 to 6 of ISO 11568, in the financial services environment.
Committee |
X9
|
DocumentType |
Standard
|
PublisherName |
American Bankers Association
|
Status |
Superseded
|
SupersededBy |
Standards | Relationship |
ISO 13491-2:2017 | Identical |
ANSI X9.8-1 : 2015 | FINANCIAL SERVICES - PERSONAL IDENTIFICATION NUMBER (PIN) MANAGEMENT AND SECURITY - PART 1: BASIC PRINCIPLES AND REQUIREMENTS FOR PINS IN CARD-BASED SYSTEMS |
ANSI X9.97-1 : 2009 | FINANCIAL SERVICES - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 1: CONCEPTS, REQUIREMENTS AND EVALUATION METHODS |
ANSI X9.79-4 : 2013 | PUBLIC KEY INFRASTRUCTURE (PKI) - PART 4: ASYMMETRIC KEY MANAGEMENT |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO 13491-1:2016 | Financial services — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
ISO 16609:2012 | Financial services — Requirements for message authentication using symmetric techniques |
ISO 9564-1:2017 | Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems |
ISO 9564-2:2014 | Financial services — Personal Identification Number (PIN) management and security — Part 2: Approved algorithms for PIN encipherment |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.