Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

ANSI X9.42 : 2003(R2013)

Current
Current

The latest, up-to-date edition.

PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES: AGREEMENT OF SYMMETRIC KEYS USING DISCRETE LOGARITHM CRYPTOGRAPHY
Published date

12-01-2013

1 SCOPE
2 NORMATIVE REFERENCES
3 DEFINITIONS
4 SYMBOLS AND ABBREVIATIONS
  4.1 SYMBOLS
  4.2 ABBREVIATIONS
5 ORGANIZATION
6 APPLICATION
7 BASIC ALGORITHMS, FUNCTIONS, AND CONVERSION RULES
  7.1 DOMAIN PARAMETER GENERATION
  7.2 DOMAIN PARAMETER VALIDATION
  7.3 PRIVATE/PUBLIC KEY GENERATION
  7.4 PUBLIC KEY VALIDATION
  7.5 CALCULATION OF SHARED SECRET ELEMENTS
  7.6 DATA CONVERSION RULES
  7.7 KEY DERIVATION FROM A SHARED SECRET VALUE
  7.8 MAC COMPUTATION
  7.9 ANSI X9.42 IMPLEMENTATION VALIDATION
8 KEY AGREEMENT SCHEMES
  8.1 KEY AGREEMENT USING THE DIFFIE-HELLMAN ALGORITHM
  8.2 KEY AGREEMENT USING THE MQV ALGORITHM
ANNEX A (NORMATIVE) PARAMETER SYNTAX AND ENCODING RULES
  A.1 FINITE FIELD SYNTAX
  A.2 PARAMETER SYNTAX
  A.3 PUBLIC KEY SYNTAX
  A.4 SCHEME SYNTAX
  A.5 KEY DERIVATION SYNTAX
  A.6 MAC FOR ANSI X9.42 IMPLEMENTATION VALIDATION
  A.7 ASN.1 MODULE
ANNEX B (NORMATIVE) DOMAIN PARAMETER GENERATION
  B.1 GENERATION OF PRIME MODULI
  B.2 SELECTION OF A GENERATOR FOR Q-ORDER SUBGROUP
  B.3 JACOBI SYMBOL
ANNEX C (NORMATIVE) PSEUDO-RANDOM NUMBER GENERATOR
  C.1 PSEUDO-RANDOM NUMBER GENERATOR BASED ON G(T, C)
  C.2 PSEUDO-RANDOM NUMBER GENERATOR USING THE TDEA
ANNEX D (INFORMATIVE) CALCULATION EXAMPLES
  D.1 GENERATION OF DOMAIN PARAMETERS
  D.2 GENERATION OF PRIVATE/PUBLIC KEYS
  D.3 SHARED SECRET VALUE CALCULATION - USING DIFFIE-HELLMAN
      ALGORITHM
  D.4 SHARED SECRET VALUE CALCULATIONS - USING MQV ALGORITHM
  D.5 KEY DERIVATION FUNCTION
  D.6 MAC COMPUTATION
ANNEX E (INFORMATIVE) SECURITY CONSIDERATIONS
  E.1 SECURITY OF THE DISCRETE LOGARITHM PROBLEM IN GF(P)
  E.2 SECURITY OF KEY AGREEMENT SCHEMES
  E.3 GUIDELINES ON SELECTING AN ANSI X9.42 KEY AGREEMENT SCHEME
  E.4 GENERAL SECURITY CONSIDERATIONS
ANNEX F (INFORMATIVE) SUMMARY OF CHANGES FROM ANS X9.42-2001
  F.1 TECHNICAL ISSUES
  F.2 EDITORIAL ISSUES
ANNEX G (INFORMATIVE) REFERENCES
TABLES

Describes schemes for the agreement of symmetric keys using Diffie-Hellman and MQV algorithms. It covers methods of domain parameter generation, domain parameter validation, key pair generation, public key validation, shared secret value calculation, key derivation, and test message authentication code computation for discrete logarithm problem based key agreement schemes.

Committee
X9
DocumentType
Standard
PublisherName
American Bankers Association
Status
Current

13/30257954 DC : 0 BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
ANSI X9.98 : 2010(R2017) FINANCIAL SERVICES - LATTICE-BASED POLYNOMIAL PUBLIC KEY ESTABLISHMENT ALGORITHM FOR THE FINANCIAL SERVICES INDUSTRY
BS IEC 62055-41:2014 Electricity metering. Payment systems Standard transfer specification (STS). Application layer protocol for one-way token carrier systems
ANSI X9.96 : 2004 FINANCIAL SERVICES - XML CRYPTOGRAPHIC MESSAGE SYNTAX (XCMS)
BS EN 14890-1:2008 Application interface for smart cards used as secure signature creation devices Basic services
BS ISO/IEC 15946-3:2002 Information technology. Security techniques. Cryptographic techniques based on elliptic curves Key establishment
INCITS/ISO/IEC 15946-3 : 2002 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT
IEEE 1363.3-2013 IEEE Standard for Identity-Based Cryptographic Techniques using Pairings
IEEE 1363.2 : 2008 SPECIFICATION FOR PASSWORD-BASED PUBLIC-KEY CRYPTOGRAPHIC TECHNIQUES
BIS IS 15256-4 : 2013 BANKING - KEY MANAGEMENT (RETAIL) - PART 4: ASYMMETRIC CRYPTOSYSTEMS - KEY MANAGEMENT AND LIFE CYCLE
ANSI X9.44 : 2007 FINANCIAL SERVICES - PUBLIC-KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - KEY ESTABLISHMENT USING INTEGER FACTORIZATION CRYPTOGRAPHY
ASTM E 2085 : 2000 : REV A Standard Guide on Security Framework for Healthcare Information (Withdrawn 2009)
16/30335156 DC : 0 BS EN 14615 - POSTAL SERVICES - DIGITAL POSTAGE MARKS - APPLICATIONS, SECURITY AND DESIGN
13/30284056 DC : 0 BS EN 62055-41 - ELECTRICITY METERING - PAYMENT SYSTEMS - PART 41: STANDARD TRANSFER SPECIFICATION (STS) - APPLICATION LAYER PROTOCOL FOR ONE-WAY TOKEN CARRIER SYSTEMS
03/103592 DC : DRAFT MAR 2003 BS EN 14615 - POSTAL SERVICES - AUTOMATED PROCESSING OF MAIL ITEMS - DIGITAL POSTAGE MARKS
BS ISO/IEC 18367:2016 Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing
02/648262 DC : DRAFT JUN 2002 ISO/IEC FCD 7816-15 - INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 15: CRYPTOGRAPHIC INFORMATION APPLICATION
ANSI X9 TR 39 : 2009 TG-3 RETAIL FINANCIAL SERVICES COMPLIANCE GUIDELINE - PART 1: PIN SECURITY AND KEY MANAGEMENT
CAN/CSA-ISO/IEC 18367:18 Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15)
I.S. EN 14890-1:2008 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
ISO/IEC 18367:2016 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing
IEC 62055-41:2014 RLV Electricity metering – Payment systems – Part 41: Standard transfer specification (STS) – Application layer protocol for one-way token carrier systems
CSA ISO/IEC 15946-3 : 2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT
14/30293056 DC : 0 BS ISO/IEC 7816-15 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PART 15: CRYPTOGRAPHIC INFORMATION APPLICATION
BS ISO 11568-4:2007 Banking. Key management (retail) Asymmetric cryptosystems. Key management and life cycle
DIN EN 14890-1:2009-03 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
07/30161079 DC : 0 BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
12/30255293 DC : 0 BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
BS ISO/IEC 11770-3 : 2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
UNI EN 419212-1 : 2015 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
ANSI X9.65 : 2004 TRIPLE DATA ENCRYPTION ALGORITHM (TDEA), IMPLEMENTATION STANDARD
15/30279582 DC : 0 BS ISO/IEC 18367 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC ALGORITHMS AND SECURITY MECHANISMS CONFORMANCE TESTING
DIN EN 14890-1 E : 2009 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
ANSI X9/TG-3 : 2006 RETAIL FINANCIAL SERVICES COMPLIANCE GUIDELINE - ONLINE PIN SECURITY AND KEY MANAGEMENT
EN 14890-1:2008 Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services
CAN/CSA-ISO/IEC 11770-3:16 Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques (Adopted ISO/IEC 11770-3:2015, third edition, 2015-08-01)
07/30161232 DC : 0 BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
INCITS/ISO/IEC 7816-15 : 2004 IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS WITH CONTACTS - PART 15: CRYPTOGRAPHIC INFORMATION APPLICATION
IEC 62055-41:2018 RLV Electricity metering - Payment systems - Part 41: Standard transfer specification (STS) - Application layer protocol for one-way token carrier systems
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
ISO/IEC 15946-3:2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 3: Key establishment
ISO 11568-4:2007 Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
IEC 62055-41 REDLINE : 3ED 2018 ELECTRICITY METERING - PAYMENT SYSTEMS - PART 41: STANDARD TRANSFER SPECIFICATION (STS) - APPLICATION LAYER PROTOCOL FOR ONE-WAY TOKEN CARRIER SYSTEMS

ANSI X9.30.1 : 1997 PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - PART 1: THE DIGITAL SIGNATURE ALGORITHM (DSA)
ANSI X9.57 : 1997 PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY: CERTIFICATE MANAGEMENT
ANSI X9.80 : 2005(R2013) PRIME NUMBER GENERATION, PRIMALITY TESTING, AND PRIMALITY CERTIFICATES
ISO/IEC 8825-2:2015 Information technology ASN.1 encoding rules: Specification of Packed Encoding Rules (PER) Part 2:
ANSI X9/TG-9 : 1995 ABSTRACT SYNTAX NOTATION AND ENCODING RULES FOR FINANCIAL INDUSTRY STANDARDS
ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
ANSI X9.52 : 1998 TRIPLE DATA ENCRYPTION ALGORITHM MODES OF OPERATION
ISO/IEC 8824-2:2015 Information technology Abstract Syntax Notation One (ASN.1): Information object specification Part 2:
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
ANSI X9.71 : 2000 KEYED HASH MESSAGE AUTHENTICATION CODE (MAC)
ISO/IEC 8824-4:2015 Information technology Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications Part 4:
ISO/IEC 8824-1:2015 Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Part 1:
ANSI INCITS 92 : 1981 DATA ENCRYPTION ALGORITHM
ANSI X9.17 : 1995 FINANCIAL INSTITUTION KEY MANAGEMENT (WHOLESALE),
ANSI X9.30.2 : 1997 PUBLIC KEY CRYPTOGRAPHY USING IRREVERSIBLE ALGORITHMS - PART 2: THE SECURE HASH ALGORITHM (SHA-1)
ISO/IEC 8824-3:2015 Information technology Abstract Syntax Notation One (ASN.1): Constraint specification Part 3:
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

View more information
Sorry this product is not available in your region.

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more