AS 2805.4.2-2006
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Electronic funds transfer - Requirements for interfaces Message authentication - Mechanisms using a hash-function
Hardcopy , PDF 1 User , PDF 3 Users , PDF 5 Users , PDF 9 Users
16-10-2019
English
07-07-2006
Specifies a choice of two hash function algorithms for use on the Australian EFT environment.
Committee |
IT-005
|
DocumentType |
Standard
|
ISBN |
0 7337 7599 3
|
Pages |
19
|
PublisherName |
Standards Australia
|
Status |
Superseded
|
SupersededBy | |
Supersedes | |
UnderRevision |
This Standard specifies two Message Authentication Code (MAC) algorithms that use a secret key and a hash-function with an n-bit result to calculate an m-bit MAC. These mechanisms are data integrity mechanisms to verify that data has not been altered in an unauthorized manner. They may also be used as message authentication mechanisms to provide assurance that a message has been originated by an entity in possession of the secret key. The strength of the data integrity mechanism and message authentication mechanism is dependent on the length (in bits) k and secrecy of the key, on the length (in bits) n of the hash-function and its strength, on the length (in bits) m of the MAC, and on the specific mechanism.This Standard provides a method for protection against accidental or deliberate alteration of messages between sending and receiving parties. A hash-function based file integrity mechanism is described in AS 2805.10.1.This Standard does not provide for - (a) the use of encryption for the protection of messages against unauthorized disclosure; or(b) protection against message loss or duplication .
Originated as AS 2805.4.2-2001.
Second edition 2006.
AS 2805.10.1-2004 | Electronic funds transfer - Requirements for interfaces File transfer integrity validation |
AS 2805.13.2-2000 | Electronic funds transfer Requirements for interfaces - Secure hash functions (Reconfirmed 2013) |
AS 2805.2-2000 | Electronic funds transfer - Requirements for interfaces Message structure, format and content |
AS 2805.6.5.3-2004 | Electronic funds transfer - Requirements for interfaces Key management - TCU initialization - Asymmetric |
AS 2805.13.3-2000 | Electronic funds transfer - Requirements for interfaces Secure hash functions - SHA-1 |
AS 2805.6.6-2006 | Electronic funds transfer - Requirements for interfaces Key management - Session keys - Node to node with KEK replacement |
AS 2805.4.1-2001 | Electronic funds transfer - Requirements for interfaces Message authentication - Mechanisms using a block cipher (Reconfirmed 2016) |
AS 2805.13.1-2000 | Electronic funds transfer - Requirements for interfaces Secure hash functions - General (Reconfirmed 2013) |
AS 2805.6.5.1-2000 | Electronic funds transfer - Requirements for interfaces Key management - TCU initialization - Principles |
AS 1776-1980 | Information processing - 7-bit coded character set for information interchange |
AS 2805.6.2-2002 | Electronic funds transfer - Requirements for interfaces Key management - Transaction keys (Reconfirmed 2013) |
AS 2805.6.5.2-2000 | Electronic funds transfer - Requirements for interfaces Key management - TCU initialization - Symmetric |
AS 2805.6.1-2002 | Electronic funds transfer - Requirements for interfaces Key management - Principles |
AS 2805.6.3-2000 | Electronic funds transfer - Requirements for interfaces Key management - Session keys - Node to node (Reconfirmed 2013) |
AS 2805.6.7-2011 | Electronic funds transfer - Requirements for interfaces Key management - Transaction keys - Derived unique key per transaction (DUKPT) (Reconfirmed 2023) |
AS 2805.2:2019 | Electronic funds transfers - Requirements for interfaces Message structures, format and content |
AS 2805.6.1-2002 | Electronic funds transfer - Requirements for interfaces Key management - Principles |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.