Contents Page
Foreword .............................................................................................................................................................. v
Introduction ........................................................................................................................................................vi
1 Scope ...................................................................................................................................................... 1
2 Normative references ............................................................................................................................ 1
3 Terms and definitions ........................................................................................................................... 2
3.1 Cryptographic Domain .......................................................................................................................... 2
3.2 hex-ASCII ................................................................................................................................................ 2
3.3 Initialization Vector (IV) ......................................................................................................................... 2
3.4 Key Block Encryption Key .................................................................................................................... 2
3.5 Key Block Authentication key .............................................................................................................. 2
3.6 Key Block Protection Key ..................................................................................................................... 2
3.7 Key Wrapping Key ................................................................................................................................. 2
3.8 Key Wrapping Mechanism .................................................................................................................... 2
3.9 Pseudorandom Function ...................................................................................................................... 3
3.10 Secure Cryptographic Device (SCD) ................................................................................................... 3
3.11 Subkey .................................................................................................................................................... 3
3.12 Unwrapping ............................................................................................................................................ 3
3.13 Wrapping ................................................................................................................................................ 3
4 Symbols and abbreviated terms .......................................................................................................... 3
4.1 Notation .................................................................................................................................................. 3
4.2 ASCII ....................................................................................................................................................... 4
4.3 CAPI ........................................................................................................................................................ 4
4.4 CBC ......................................................................................................................................................... 4
4.5 EMV ......................................................................................................................................................... 4
4.6 ID ............................................................................................................................................................. 4
4.7 KBH ......................................................................................................................................................... 4
4.8 KEK ......................................................................................................................................................... 4
4.9 MAC ......................................................................................................................................................... 4
4.10 MFK ......................................................................................................................................................... 5
4.11 PIN ........................................................................................................................................................... 5
4.12 TCBC ....................................................................................................................................................... 5
4.13 0x ............................................................................................................................................................. 5
5 Key Block Properties and Characteristics .......................................................................................... 5
5.1 Key Block Elements .............................................................................................................................. 5
5.2 Confidential Data to be Exchanged/Stored ......................................................................................... 5
5.3 Key Block Binding and Validation Methods ....................................................................................... 5
5.3.1 General .................................................................................................................................................... 5
5.3.2 Key Block Binding Method Using Key Derivation (Preferred) .......................................................... 6
5.3.3 Key Block Binding Method Using Variants (TDEA only) .................................................................13
Annex A. Key Block with Optional Block .......................................................................................................15
Annex B. Process for Approval of New Field Values ....................................................................................75
Annex C. New Field Value Request Form ......................................................................................................77
This is a preview of "ASC X9 TR 31-2018". Click here to purchase the full version from the ANSI store.