没有合适的资源?快使用搜索试试~ 我知道了~
首页ANSI X9 TR-31_2010
ANSI X9 TR-31_2010
4星 · 超过85%的资源 需积分: 38 40 下载量 87 浏览量
更新于2023-03-16
评论
收藏 405KB PDF 举报
Describes a method consistent with the requirements of ANS X9.24 Retail Financial Services Symmetric Key Management Part 1 for the secure exchange of keys and other sensitive data between two devices that share a symmetric key exchange key.
资源详情
资源评论
资源推荐
X9 TR-31 2010
Interoperable Secure Key Exchange Key
Block Specification for Symmetric
Algorithms
A Technical Report prepared by:
Accredited Standards Committee X9, Incorporated
Financial Industry Standards
Registered with American National Standards Institute
Date Registered: December 9, 2010
American National Standards, Technical Reports and Guides developed through the Accredited Standards
Committee X9, Inc., are copyrighted. Copying these documents for personal or commercial use outside X9
membership agreements is prohibited without express written permission of the Accredited Standards Committee
X9, Inc. For additional information please contact ASC X9, Inc., 1212 West Street, Suite 200, Annapolis,
Maryland 21401.
Licensed to Ralph Qin. ANSI order X_226421. Downloaded 5/19/2011 6:11 AM. Single user license only. Copying and networking prohibited.
Licensed to Ralph Qin. ANSI order X_226421. Downloaded 5/19/2011 6:11 AM. Single user license only. Copying and networking prohibited.
X9 X9 TR-31
2010
© 2010 – All rights reserved i
Contents Page
Foreword .......................................................................................................................................................v
Introduction ..................................................................................................................................................vi
1 Scope ................................................................................................................................................1
2 References ........................................................................................................................................1
3 Terms and definitions ......................................................................................................................2
4 Symbols and abbreviated terms ......................................................................................................3
5 Key Block Properties and Characteristics ......................................................................................5
5.1 Key Block Elements .........................................................................................................................5
5.2 Confidential Data to be Exchanged/Stored .....................................................................................5
5.3 Key Block Binding and Validation Methods ....................................................................................5
5.3.1 General..............................................................................................................................................5
5.3.2 Key Block Binding Method Using Key Derivation (Preferred) ........................................................5
5.3.3 Key Block Binding Method Using Variants .....................................................................................9
Annex A CBC MAC Key Block with Optional Block .................................................................................. 11
A.1 Introduction .................................................................................................................................... 11
A.2 Key Block Header (KBH) ................................................................................................................ 11
A.3 Encryption ...................................................................................................................................... 14
A.3.1 Encryption Using Key Derivation Binding Method ....................................................................... 14
A.3.2 Encryption Using Key Variant Binding Method ............................................................................ 14
A.4 MAC................................................................................................................................................. 15
A.4.1 MAC Using Key Variant Binding Method ....................................................................................... 15
A.4.2 MAC Using Key Derivation Binding Method ................................................................................. 15
A.5 Defined values for Key Block Headers .......................................................................................... 15
A.5.1 Key Usage ....................................................................................................................................... 15
A.5.2 Algorithm ........................................................................................................................................ 18
A.5.3 Mode of Use .................................................................................................................................... 18
A.5.4 Key Version Number ...................................................................................................................... 20
A.5.5 Exportability ................................................................................................................................... 20
A.5.6 Optional block ID ............................................................................................................................ 21
A.6 Encoding ......................................................................................................................................... 23
A.7 Key Block Examples ...................................................................................................................... 24
A.7.1 Notation Used ................................................................................................................................. 24
A.7.2 Example 1: Key Block without Optional Blocks ............................................................................ 24
A.7.3 Example 2: Key Block with Optional Block .................................................................................. 37
A.8 The CMAC mode for authentication .............................................................................................. 50
A.8.1 Introduction .................................................................................................................................... 50
A.8.2 Subkey derivation........................................................................................................................... 51
A.8.3 MAC generation with CMAC........................................................................................................... 54
A.8.4 MAC Verification with CMAC ......................................................................................................... 57
Annex B Process for Approval of New Field Values ................................................................................. 58
B.1 Introduction .................................................................................................................................... 58
B.2 Origination ...................................................................................................................................... 58
B.3 Justification for Proposal ............................................................................................................... 58
B.4 Examination of Proposals .............................................................................................................. 58
Licensed to Ralph Qin. ANSI order X_226421. Downloaded 5/19/2011 6:11 AM. Single user license only. Copying and networking prohibited.
X9 X9 TR-31 2010
ii
©
2010 – All rights
reserved
B.5 Appeals Procedure......................................................................................................................... 59
B.6 Approved List Of Key Block Field Values ..................................................................................... 59
B.7 TR-31 Revision ............................................................................................................................... 59
Annex C New Field Value Request Form ................................................................................................... 60
Licensed to Ralph Qin. ANSI order X_226421. Downloaded 5/19/2011 6:11 AM. Single user license only. Copying and networking prohibited.
X9 X9 TR-31
2010
© 2010 – All rights reserved iii
Figures
Figure 1 — Deriving a 2-Key TDEA MAC and Encryption Key .............................................................................. 7
Figure 2 — Deriving a 3-Key TDEA MAC and Encryption Key .............................................................................. 7
Figure 3 — Key Block Binding Method ................................................................................................................. 8
Figure 4 — CBC MAC Key Block ....................................................................................................................... 11
Figure 5 — Examples of KBH and Optional Blocks ............................................................................................. 22
Figure 6 — CMAC Subkey Derivation from the Key Block Protection Key ........................................................... 30
Figure 7 — Deriving the Key Block Encryption Key from the Key Block Protection Key ....................................... 31
Figure 8 — Derivation of the Key Block MAC Key from the Key Block Protection Key ......................................... 32
Figure 9 — CMAC Subkey Derivation from the Key Block MAC Key ................................................................... 33
Figure 10 — Calculation of the MAC over the Header and the Binary Key Data .................................................. 34
Figure 11 — Encrypting the confidential data ..................................................................................................... 36
Figure 12 — CMAC Subkey Derivation from the Key Block Protection Key ......................................................... 43
Figure 13 — Deriving the Key Block Encryption Key from the Key Block Protection Key ..................................... 44
Figure 14 — Derivation of the Key Block MAC Key from the Key Block Protection Key ....................................... 45
Figure 15 — CMAC Subkey Derivation from the Key Block MAC Key ................................................................. 46
Figure 16 — Calculation of the MAC over the Header and the Key Data ............................................................. 48
Figure 17 — Encrypting the confidential data ..................................................................................................... 49
Figure 18 - CMAC process overview .................................................................................................................. 51
Figure 19 — CMAC Subkey Derivation for TDEA ............................................................................................... 52
Figure 20 — CMAC Subkey Derivation for AES .................................................................................................. 54
Figure 21 — Calculating the MAC with CMAC, Case a ....................................................................................... 56
Figure 22 — Calculating the MAC with CMAC, Case b ....................................................................................... 57
Tables
Table 1 — Key Derivation Input Data ................................................................................................................... 5
Table 5-2. Encryption IV ....................................................................................................................................... 9
Table A-1. KBH for CBC MAC Binding Method ................................................................................................... 12
Licensed to Ralph Qin. ANSI order X_226421. Downloaded 5/19/2011 6:11 AM. Single user license only. Copying and networking prohibited.
剩余71页未读,继续阅读
chjwins
- 粉丝: 0
- 资源: 2
上传资源 快速赚钱
- 我的内容管理 收起
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
会员权益专享
最新资源
- RTL8188FU-Linux-v5.7.4.2-36687.20200602.tar(20765).gz
- c++校园超市商品信息管理系统课程设计说明书(含源代码) (2).pdf
- 建筑供配电系统相关课件.pptx
- 企业管理规章制度及管理模式.doc
- vb打开摄像头.doc
- 云计算-可信计算中认证协议改进方案.pdf
- [详细完整版]单片机编程4.ppt
- c语言常用算法.pdf
- c++经典程序代码大全.pdf
- 单片机数字时钟资料.doc
- 11项目管理前沿1.0.pptx
- 基于ssm的“魅力”繁峙宣传网站的设计与实现论文.doc
- 智慧交通综合解决方案.pptx
- 建筑防潮设计-PowerPointPresentati.pptx
- SPC统计过程控制程序.pptx
- SPC统计方法基础知识.pptx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论2