ANSI-X9.68-2001.pdf

上传人:爱问知识人 文档编号:3729929 上传时间:2019-09-22 格式:PDF 页数:66 大小:505.16KB
返回 下载 相关 举报
ANSI-X9.68-2001.pdf_第1页
第1页 / 共66页
ANSI-X9.68-2001.pdf_第2页
第2页 / 共66页
ANSI-X9.68-2001.pdf_第3页
第3页 / 共66页
ANSI-X9.68-2001.pdf_第4页
第4页 / 共66页
ANSI-X9.68-2001.pdf_第5页
第5页 / 共66页
亲,该文档总共66页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

《ANSI-X9.68-2001.pdf》由会员分享,可在线阅读,更多相关《ANSI-X9.68-2001.pdf(66页珍藏版)》请在三一文库上搜索。

1、ANS X9.68-2001 American National Standard for Financial Services X9.68-2001 X9.68 - 2001: Digital Certificates for Mobile/Wireless and High Transaction Volume Financial Systems: Part 2: Domain Certificate Syntax Approved: December 26, 2001 American National Standards Institute Secretariat Accredited

2、 Standards Committee X9, Inc. Copyright American National Standards Institute Provided by IHS under license with ANSI Licensee=USN Ship Repair Facility Yokosuka/9961031100 Not for Resale, 05/08/2007 19:40:57 MDTNo reproduction or networking permitted without license from IHS -,-,- ANSI X9.68 2001 Am

3、erican Bankers Association Contents 1 SCOPE 12 2 Normative references 12 3 Definitions 14 4 Abbreviations 15 5. Organization 16 6. Overview 16 7. Public Key Domain Certificates 117 7.1 DOMAIN CERTIFICATE SYNTAX 117 7.2 CERTIFICATE BODY SYNTAX 12 8 Public Key Domain Certificate Extensions 25 8.1 DOMA

4、IN CERTIFICATE EXTENSIONS SYNTAX 19 8.2 CRITICALITY EXTENSION COMPONENT 20 8.3 KEY USAGE EXTENSION COMPONENT 20 8.4 BASIC CONSTRAINT EXTENSION COMPONENT 21 8.5 PATH LENGTH CONSTRAINTS EXTENSION COMPONENT 21 8.6 AUTHORITY KEY IDENTIFIER EXTENSION COMPONENT 22 8.7 OWNER KEY IDENTIFIER EXTENSION COMPON

5、ENT 23 8.8 EXTENDED KEY USAGE EXTENSION COMPONENT 23 8.9 PRIVATE KEY USAGE PERIOD EXTENSION COMPONENT 24 8.10 CERTIFICATE POLICIES EXTENSION COMPONENT 24 8.11 POLICY MAPPING EXTENSION COMPONENT 25 8.12 OWNER ALTERNATIVE NAME EXTENSION COMPONENT 26 8.13 ISSUER ALTERNATIVE NAME EXTENSION COMPONENT 27

6、8.14 OWNER DIRECTORY ATTRIBUTES EXTENSION COMPONENT 27 8.15 NAME CONSTRAINTS EXTENSION COMPONENT 28 8.16 POLICY CONSTRAINTS EXTENSION COMPONENT 29 8.17 EXTERNAL REFERENCE EXTENSION COMPONENT 29 9 DOMAIN CERTIFICATE PATH PROCESSING 30 Annex A (normative) Certificate Syntax and Encoding Rules 31 A.1 P

7、UBLIC KEY SYNTAX 31 A.2 MESSAGE DIGEST SYNTAX 32 A.3 ASN.1 MODULES 33 Annex B (normative) Domain Certificate ASN.1 34 Copyright American National Standards Institute Provided by IHS under license with ANSI Licensee=USN Ship Repair Facility Yokosuka/9961031100 Not for Resale, 05/08/2007 19:40:57 MDTN

8、o reproduction or networking permitted without license from IHS -,-,- ANSI X9.68 2001 American Bankers Association B.1 DOMAINCERTIFICATE ASN.1 MODULE 34 Annex C (normative) Domain Certificate Extensions ASN.1 38 C.1 DOMAINEXTENSIONS ASN.1 MODULE 38 Annex D (normative) Domain Public Keys ASN.1 43 D.1

9、 DOMAINPUBLICKEYS ASN.1 MODULE 43 Annex E (normative) Domain Signatures ASN.1 46 E.1 DOMAINSIGNATURES ASN.1 MODULE 47 Annex F (normative) Domain Support ASN.1 48 F.1 DOMAINSUPPORT ASN.1 MODULE 49 Annex G (normative) Domain Certificate Syntax Examples 49 G.1.0 OWNER NAMES EXAMPLES 49 G.1.0.1 OBJECT I

10、DENTIFIER EXAMPLE 49 G.1.0.2 RELATIVE OBJECT IDENTIFIER EXAMPLE 50 G.1.0.3 MESSAGE DIGEST EXAMPLE 50 G.1.0.4 PUBLIC KEY EXAMPLE 50 G.1.0.5 SIGNATURE EXAMPLE 51 G.1.0.6 UNIFORM RESOURCE IDENTIFIER EXAMPLE 51 G.2.0 CERTIFICATE BODY EXAMPLES 52 G.2.0.1 CERTIFICATE BODY EXAMPLE ONE 53 G.2.0.2 CERTIFICAT

11、E BODY EXAMPLE TWO 54 G.2.0.3 COMPARATIVE X.509 CERTIFICATE BODY EXAMPLE 55 Copyright American National Standards Institute Provided by IHS under license with ANSI Licensee=USN Ship Repair Facility Yokosuka/9961031100 Not for Resale, 05/08/2007 19:40:57 MDTNo reproduction or networking permitted wit

12、hout license from IHS -,-,- ANSI X9.68 2001 American Bankers Association Foreword Business practice has changed with the introduction of computer-based technologies. The substitution of electronic transactions for their paper-based predecessors has reduced costs and improved efficiency. Trillions of

13、 dollars in funds and securities are transferred daily by telephone, wire services, and other electronic communications mechanisms. The high value or sheer volume of such transactions within an open environment exposes the financial community and its customers to potentially severe risks from accide

14、ntal or deliberate disclosure, alteration, substitution, or destruction of data. This risk is compounded by interconnected networks, and the increased number and sophistication of malicious adversaries. This standard defines syntax for a more compact certificate than that defined in ISO 15782-1 and

15、X.509. This syntax is appropriate for use in environments with constraints imposed by mobility and/or limited bandwidth (e.g., wireless communications with personal digital assistants), high volumes of transactions (e.g., Internet commerce), or limited storage capacity (e.g., smart cards). This synt

16、ax is also geared towards use in account-based systems. While the techniques specified in this Standard are designed to provide syntax for compact certificates, the Standard does not guarantee that a particular implementation meets the requirements of the standard or other regulatory and statutory p

17、ractices describing prudent business practices. It is the responsibility of the financial institution to put an overall process in place with the necessary controls to ensure that the process is securely implemented. Furthermore, the controls should include the application of appropriate audit tests

18、 in order to verify compliance with this Standard. Suggestions for the improvement or revision of this standard are welcome. They should be sent to Accredited Standards Committee X9, Inc., P.O. Box 4035, Annapolis, Maryland, 21403, USA. This standard was processed and approved for submittal to ANSI

19、by the Accredited Standards Committee on Financial Services, X9. Committee approval of the standard does not necessarily imply that all the committee members voted for its approval. At the time that this standard was approved, the X9 Committee had the following members: Harold G. Deal, X9 Chairman,

20、BB 2. simplifying the certificate extension format; 3. predefining a fixed order of certificate extensions; and 4. allowing the use of Packed Encoding Rules (PER) 9. These certificates include the functionality of all of the certificate extensions described in ISO 15782-2 11. User-defined extensions

21、 are also provided to enhance flexibility. 2 Normative references The following standards contain provisions that, through reference in this text, constitute provisions of this American National Standard. At the time of publication, the editions indicated were valid. All standards are subject to rev

22、ision, and parties to agreements based on this American National Standard are encouraged to investigate the possibility of applying the most recent editions of the standards indicated below. Accredited Standards Committee X9 (ASC X9) maintains a register of currently valid financial industry standar

23、ds. 1. ISO/IEC 10021-4: 1999 | ITU-T Recommendation X.411 (1998), Information technology - Message Handling Systems (MHS) - Message Transfer System: Abstract service definition and procedures. 2. ISO/IEC 9594-8: Information technology | ITU-T Recommendation X.509, Open Systems Interconnection - The

24、Directory: Authentication framework”, International Organization for Standardization, Geneva, Switzerland, 2000. ANSI X9-68 2001 American Bankers Association 3. ISO/IEC 9834-1 | ITU-T Recommendation X.660, Open Systems Interconnection (OSI) - Procedures for the Operation of OSI Registration Authorit

25、ies: General Procedures. 4. ISO/IEC 8824-1:1998 | ITU-T Recommendation X.680 (1997), Information Technology - Abstract Syntax Notation One (ASN.1): Specification of Basic Notation. 5. ISO/IEC 8824-2:1998 | ITU-T Recommendation X.681 (1997), Information Technology - Abstract Syntax Notation One (ASN.

26、1): Information Object Specification. 6. ISO/IEC 8824-3:1998 | ITU-T Recommendation X.682 (1997), Information Technology - Abstract Syntax Notation One (ASN.1):Constraint Specification 7. ISO/IEC 8824-4:1998 | ITU-T Recommendation X.683 (1997),Information Technology - Abstract Syntax Notation One (A

27、SN.1): Parameterization of ASN.1 Specifications. 8. ISO/IEC 8825-1:1998 | ITU-T Recommendation X.690 (1997),Information Technology - ASN.1 Encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER). 9. ISO/IEC 8825-2:1998 | ITU-

28、T Recommendation X.691 (1997),Information Technology - ASN.1 Encoding Rules: Specification of Packed Encoding Rules (PER). 10. ISO DIS 15782-1:2000, Banking - Certificate Management Part 1: Public Key Certificates. 11. ISO FDIS 15782-2:2000, Banking - Certificate Management Part 2: Certificate Exten

29、sions. 12. X9.30-1997, Public Key Cryptography Using Irreversible Algorithms for the Financial Services Industry, Part 1: The Digital Signature Algorithm (DSA) (Revised). 13. X9.30-1994, Public Key Cryptography Using Irreversible Algorithms for the Financial Services Industry, Part 2: The Secure Has

30、h Algorithm (SHA) (Revised). 14. X9.31-1998, Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA). 15. X9.62-2000, Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). ANSI X9-68 2001 Am

31、erican Bankers Association 16. X9.68-1 (draft), Digital Certificates for Mobile/Wireless and High Transaction Volume Financial Systems: Domain Certificate Architecture. 17. Larmouth, John. Understanding OSI. London, International Thompson Computer Press, 1996. ISBN 1-85032-176-0. 18. RFC-791: J. Pos

32、tel, Internet Protocol, September 1, 1981. 19. RFC-822: D. Crocker, Standard for the format of ARPA Internet text messages, August 13, 1982. 20. RFC-1035: P. Mockapetris, Domain names - implementation and specification, November 1, 1987. 21. RFC-1630: T. Berners-Lee, Universal Resource Identifiers i

33、n WWW: A Unifying Syntax for the Expression of Names and Addresses of Objects on the Network as used in the World-Wide Web, June 9, 1994. 22. RFC-2253: Kille, S., and M. Wahl, Lightweight Directory Access Protocol: UTF8 String Representation of Distinguished Names, December 4, 1997. 3 Definitions 3.

34、1 Bit string A bit string is a sequence of 0s and 1s. The left-most bit is the most-significant bit of the string. The right-most bit is the least-significant bit of the string. 3.2 Certificate The public key and the identity of an entity together with some other information, rendered unforgeable by

35、 signing the entire certificate with the private key of the certification authority which issued that certificate. 3.3 Certification authority (CA) An entity trusted by one or more entities to create, assign and revoke public key certificates. 3.4 Cryptography The discipline that embodies the princi

36、ples, means and methods for the transformation of data in order to hide its information content, prevent its undetected modification, prevent its unauthorized use or a combination thereof. 3.5 Hash function A (mathematical) function that maps values from a large (possibly very large) domain into a s

37、maller range and ideally satisfies the following properties: 1. (One-way) It is computationally infeasible to find any input which maps to any pre-specified output; ANSI X9-68 2001 American Bankers Association 2. (Collision Free) It is computationally infeasible to find any two distinct inputs that

38、map to the same output. 3.6 Octet An octet is a bit string of length 8. An octet is represented by a hexadecimal string of length 2. The first hexadecimal digit represents the four most-significant bits of the octet. The second hexadecimal digit represents the four least-significant bits of the octe

39、t. For example, 9D represents the binary string 100111012. 3.7 Octet string An octet string is a sequence of octets. 3.8 Private Key In an asymmetric (public) key cryptosystem, that key of an entitys key pair which is known only by that entity. See public key. 3.9 Protocol A series of ordered steps

40、performed by several parties to achieve an objective. 3.10 Public Key In an asymmetric (public) key cryptosystem, that key of an entitys key pair which is publicly known. See private key. 4. Abbreviations Abbreviation Meaning AA Attribute Authority ASN.1 Abstract Syntax Notation One BER Basic Encodi

41、ng Rules of ASN.1 CA Certification Authority CRL Certificate Revocation List DER Distinguished Encoding Rules of ASN.1 DSA Digital Signature Algorithm ECDSA Elliptic Curve Digital Signature Algorithm PER Packed Encoding Rules of ASN.1 PKI Public Key Infrastructure RA Registration Authority ANSI X9-6

42、8 2001 American Bankers Association RSA Rivest Shamir Adleman (Public Key Cryptosystem) SHA-1 Secure Hash Algorithm (Revised) URI Uniform Resource Identifier 5. Organization The following normative annexes are integral parts of the standard which, for reasons of convenience, are placed after all oth

43、er normative elements. Annex Contents A Certificate Syntax and Encoding Rules B Domain Certificate ASN.1 C Domain Certificate Extensions ASN.1 D Domain Public Keys ASN.1 E Domain Signatures ASN.1 F Domain Support ASN.1 G Domain Certificate Syntax Examples 6. Overview Part one of ANSI X9.68 16 provid

44、es an overview of domain based financial transaction systems and illustrates the need for a compact certificate and public key infrastructure. This part of the standard defines the basic requirements for a compact certificate format and syntax, which meets these requirements. From a requirement pers

45、pective, a certificate is a data structure that is designed to provide a binding between an entitys name and its public key. Reliance on the certificate implies the ability to validate this binding. As a minimum, the certificate data structure must contain the name of the entity to be bound to the p

46、ublic key, the public key itself, the name of the trusted third party performing the binding, and the binding mechanism, i.e., a digital signature. ANSI X9-68 2001 American Bankers Association The use of a certificate data structure requires that the certificate can be generated, stored, retrieved,

47、transmitted, parsed, and validated. The ease and efficiency of performing these operations frequently imply conflicting requirements that must be reflected in the certificate data structure design. These conflicting requirements are reconciled by appropriate tradeoffs. Efficient storage and transmis

48、sion are related to minimal size. Retrieval requires an effective identification mechanism. Mechanical parsing, translation and interoperability necessitate effective, formal encoding rules. The goal of efficient storage and transmission often conflicts with that of precise identification and effect

49、ive parsing. This standard defines a certificate format aimed at minimal storage and transmission bandwidth while preserving unique identification and ease of use. A single, simple owner name replaces the larger and more complex subject, issuer and serial number components used in X.509 certificates. The functionality of common X.509 certificate extensions is preserved, but presented

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 其他


经营许可证编号:宁ICP备18001539号-1