• Shopping Cart
    There are no items in your cart

ANSI X9.97-2 : 2009(R2017)

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

BANKING - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 2: SECURITY COMPLIANCE CHECKLISTS FOR DEVICES USED IN FINANCIAL TRANSACTIONS

Superseded date

05-09-2024

Published date

12-01-2013

Sorry this product is not available in your region.

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Use of security compliance checklists
Annex A (normative) - Physical, logical and device management
                      characteristics common to all secure
                      cryptographic devices
Annex B (normative) - Devices with PIN entry functionality
Annex C (normative) - Devices with PIN management functionality
Annex D (normative) - Devices with message authentication
                      functionality
Annex E (normative) - Devices with key generation functionality
Annex F (normative) - Devices with key transfer and loading
                      functionality
Annex G (normative) - Devices with digital signature
                      functionality
Annex H (normative) - Categorization of environments
Bibliography

Describes checklists to be used to evaluate secure cryptographic devices (SCDs) incorporating cryptographic processes, as specified in parts 1 and 2 of ISO 9564, ISO 16609 and parts 1 to 6 of ISO 11568, in the financial services environment.

Committee
X9
DocumentType
Standard
PublisherName
American Bankers Association
Status
Superseded
SupersededBy

Standards Relationship
ISO 13491-2:2017 Identical

ANSI X9.8-1 : 2015 FINANCIAL SERVICES - PERSONAL IDENTIFICATION NUMBER (PIN) MANAGEMENT AND SECURITY - PART 1: BASIC PRINCIPLES AND REQUIREMENTS FOR PINS IN CARD-BASED SYSTEMS
ANSI X9.97-1 : 2009 FINANCIAL SERVICES - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 1: CONCEPTS, REQUIREMENTS AND EVALUATION METHODS
ANSI X9.79-4 : 2013 PUBLIC KEY INFRASTRUCTURE (PKI) - PART 4: ASYMMETRIC KEY MANAGEMENT

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO 13491-1:2016 Financial services — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods
ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
ISO 16609:2012 Financial services — Requirements for message authentication using symmetric techniques
ISO 9564-1:2017 Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems
ISO 9564-2:2014 Financial services — Personal Identification Number (PIN) management and security — Part 2: Approved algorithms for PIN encipherment

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.