没有合适的资源?快使用搜索试试~ 我知道了~
资源推荐
资源详情
资源评论
ASC X9 TR 31-2018
Interoperable Secure Key Exchange Key
Block Specification
Accredited Standards Committee X9, Incorporated
Financial Industry Standards
Date Registered: April 15, 2018
American National Standards Institute
American National Standards, Technical Reports and Guides developed through the
Accredited Standards Committee X9, Inc., are copyrighted. Copying these documents for
personal or commercial use outside X9 membership agreements is prohibited without
express written permission of the Accredited Standards Committee X9, Inc. For additional
information please contact ASC X9, Inc., 275 West Street Suite 107, Annapolis, Maryland
21401 USA.
This is a preview of "ASC X9 TR 31-2018". Click here to purchase the full version from the ANSI store.
Contents Page
Foreword .............................................................................................................................................................. v
Introduction ........................................................................................................................................................vi
1 Scope ...................................................................................................................................................... 1
2 Normative references ............................................................................................................................ 1
3 Terms and definitions ........................................................................................................................... 2
3.1 Cryptographic Domain .......................................................................................................................... 2
3.2 hex-ASCII ................................................................................................................................................ 2
3.3 Initialization Vector (IV) ......................................................................................................................... 2
3.4 Key Block Encryption Key .................................................................................................................... 2
3.5 Key Block Authentication key .............................................................................................................. 2
3.6 Key Block Protection Key ..................................................................................................................... 2
3.7 Key Wrapping Key ................................................................................................................................. 2
3.8 Key Wrapping Mechanism .................................................................................................................... 2
3.9 Pseudorandom Function ...................................................................................................................... 3
3.10 Secure Cryptographic Device (SCD) ................................................................................................... 3
3.11 Subkey .................................................................................................................................................... 3
3.12 Unwrapping ............................................................................................................................................ 3
3.13 Wrapping ................................................................................................................................................ 3
4 Symbols and abbreviated terms .......................................................................................................... 3
4.1 Notation .................................................................................................................................................. 3
4.2 ASCII ....................................................................................................................................................... 4
4.3 CAPI ........................................................................................................................................................ 4
4.4 CBC ......................................................................................................................................................... 4
4.5 EMV ......................................................................................................................................................... 4
4.6 ID ............................................................................................................................................................. 4
4.7 KBH ......................................................................................................................................................... 4
4.8 KEK ......................................................................................................................................................... 4
4.9 MAC ......................................................................................................................................................... 4
4.10 MFK ......................................................................................................................................................... 5
4.11 PIN ........................................................................................................................................................... 5
4.12 TCBC ....................................................................................................................................................... 5
4.13 0x ............................................................................................................................................................. 5
5 Key Block Properties and Characteristics .......................................................................................... 5
5.1 Key Block Elements .............................................................................................................................. 5
5.2 Confidential Data to be Exchanged/Stored ......................................................................................... 5
5.3 Key Block Binding and Validation Methods ....................................................................................... 5
5.3.1 General .................................................................................................................................................... 5
5.3.2 Key Block Binding Method Using Key Derivation (Preferred) .......................................................... 6
5.3.3 Key Block Binding Method Using Variants (TDEA only) .................................................................13
Annex A. Key Block with Optional Block .......................................................................................................15
Annex B. Process for Approval of New Field Values ....................................................................................75
Annex C. New Field Value Request Form ......................................................................................................77
This is a preview of "ASC X9 TR 31-2018". Click here to purchase the full version from the ANSI store.
剩余16页未读,继续阅读
资源评论
beyonda520
- 粉丝: 2
- 资源: 7
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 计算机网络综合实训范例及要求1.docx
- matplotlib-3.9.0-pp39-pypy39-pp73-macosx-11-0-arm64.whl
- 光刻详细介绍,特点,特性,用途,使用方法,学习方法文档
- MyBatis的插件机制简介.pdf
- vue考试33333333333
- 3GPP Release-05 description
- 2024全新Thinkphp聊天室H5实时聊天室群聊聊天室自动分配账户完群组/私聊/禁言等功能/全开源运营版本
- MQTTX 客户端工具,用于测试EMQX,MQTT连接
- 基于pytorch的比特深度增强源码+高分项目.7z
- jwts-not-safe-e-book.pdf
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功