EMV
Integrated Circuit Card
Specifications for Payment Systems
Book 2
Security and Key Management
Version 4.1
May 2004
© 1994-2004 EMVCo, LLC (“EMVCo”). All rights reserved. Any and all uses of the
EMV Specifications (“Materials”) shall be permitted only pursuant to the terms and
conditions of the license agreement between the user and EMVCo found at
http://www.emvco.com/specifications.cfm
.
EMV
Integrated Circuit Card
Specifications for Payment Systems
Book 2
Security and Key Management
Version 4.1
May 2004
EMV 4.1 Book 2
Security and Key Management
Page ii May 2004
EMV 4.1 Book 2
Security and Key Management
May 2004 Page iii
Revision Log - Version 4.1
The following changes have been made to Book 2 since the publication of
Version 4.0.
Incorporated changes described in the following Specification Updates:
Specification Update Bulletin no. 6: Modification to Combined Dynamic
Data Authentication and Application Cryptogram Generation
Specification Update Bulletin no. 12: Offline Data Authentication
Processing
Specification Update Bulletin no. 13: EMV Session Key Derivation
Specification Update Bulletin no. 20: Combined DDA/AC Generation
Specification Update Bulletin no. 21: Clarification of Actions During
Offline Enciphered PIN Processing
Specification Update Bulletin no. 25: Common Core Definitions
Specification Update Bulletin no. 26: Master Key Derivation Option
Specification Update Bulletin no. 27: ARPC Generation Option
Specification Update Bulletin no. 28: Format 1 Secure Messaging
Chaining
Specification Update Bulletin no. 30: Terminal Security Requirements for
PIN Entry and Amount Entry
Specification Update Bulletin no. 34: Format 1 Secure Messaging for
Confidentiality
Specification Update Bulletin no. 35: Change of Terminology for Issuer
Identification Number
Specification Update Bulletin no. 36: EMVCo Payment System Public Key
Policy
Updated in support of the following Application Notes:
Application Note no. 7: Data Element Format Convention Definition
Application Note no. 8: Issuer and ICC Public Key Length Restrictions
Application Note no. 19: Clarification of Odd Parity Requirements During
Session Key Derivation
Application Note no. 21: Clarification to Format 1 Secure Messaging
- 1
- 2
前往页