ISO-13492-1998.pdf

上传人:爱问知识人 文档编号:3774576 上传时间:2019-09-23 格式:PDF 页数:17 大小:52.79KB
返回 下载 相关 举报
ISO-13492-1998.pdf_第1页
第1页 / 共17页
ISO-13492-1998.pdf_第2页
第2页 / 共17页
ISO-13492-1998.pdf_第3页
第3页 / 共17页
ISO-13492-1998.pdf_第4页
第4页 / 共17页
ISO-13492-1998.pdf_第5页
第5页 / 共17页
亲,该文档总共17页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

《ISO-13492-1998.pdf》由会员分享,可在线阅读,更多相关《ISO-13492-1998.pdf(17页珍藏版)》请在三一文库上搜索。

1、A Reference number ISO 13492:1998(E) INTERNATIONAL STANDARD ISO 13492 First edition 1998-05-15 Banking Key management related data element (retail) Banque lment de donnes li la gestion des cls (services aux particuliers) Copyright International Organization for Standardization Provided by IHS under

2、license with ISO Licensee=NASA Technical Standards 1/9972545001 Not for Resale, 04/20/2007 07:08:15 MDTNo reproduction or networking permitted without license from IHS -,-,- ISO 13492:1998(E) ISO 1998 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or u

3、tilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from the publisher. International Organization for Standardization Case postale 56 CH-1211 Genve 20 Switzerland Internetisoiso.ch Printed in Switzerland ii Contents 1 Sc

4、ope1 2 Normative references1 3 Definitions 2 4 Requirements for key management related data element.2 4.1 Concept of key set identifiers3 4.2 Assignment of key set identifiers .4 5 Implementation in ISO 85834 Annex A (informative) Uses for transmitted key management related data6 Annex B (informativ

5、e) Example of usage of key set identifiers10 Copyright International Organization for Standardization Provided by IHS under license with ISO Licensee=NASA Technical Standards 1/9972545001 Not for Resale, 04/20/2007 07:08:15 MDTNo reproduction or networking permitted without license from IHS -,-,- IS

6、OISO 13492:1998(E) iii Foreword ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies (ISO member bodies). The work of preparing International Standards is normally carried out through ISO technical committees. Each member body interested in

7、a subject for which a technical committee has been established has the right to be represented on that committee. International organizations, governmental and non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the International Electrotechnical Commissi

8、on (IEC) on all matters of electrotechnical standardization. Draft International Standards adopted by the technical committees are circulated to the member bodies for voting. Publication as an International Standard requires approval by at least 75 % of the member bodies casting a vote. Internationa

9、l Standard ISO 13492 was prepared by Technical Committee ISO/TC 68, Banking, securities and other financial services, Subcommittee SC 6, Retail financial services. Annexes A and B of this International Standard are for information only. Copyright International Organization for Standardization Provid

10、ed by IHS under license with ISO Licensee=NASA Technical Standards 1/9972545001 Not for Resale, 04/20/2007 07:08:15 MDTNo reproduction or networking permitted without license from IHS -,-,- ISO 13492:1998(E) ISO iv Introduction This International Standard describes the structure and contents of a ke

11、y management related data element that may be conveyed in electronically transmitted messages within the retail banking environment to support the secure management of cryptographic keys, where the retail banking environment involves the communications between a card-accepting device and an acquirer

12、, and between an acquirer and a card issuer. Key management of keys used in an Integrated Circuit Card (ICC) and the related data elements are not covered in this International Standard. This International Standard provides compatibility with the existing ISO standard on bank card originated message

13、s (see ISO 8583). Copyright International Organization for Standardization Provided by IHS under license with ISO Licensee=NASA Technical Standards 1/9972545001 Not for Resale, 04/20/2007 07:08:15 MDTNo reproduction or networking permitted without license from IHS -,-,- INTERNATIONAL STANDARD ISOISO

14、 13492:1998(E) 1 Banking Key management related data element (retail) 1 Scope This International Standard describes a key management related data element that may be transmitted either in transaction messages to convey information about cryptographic keys used to secure the current transaction or in

15、 cryptographic service messages to convey information about cryptographic keys to be used to secure future transactions. This International Standard addresses the requirements for the use of the key management related data element within ISO 8583, using the following two ISO 8583 data elements: Secu

16、rity Related Control Information (bit 53) or Key Management Data (bit 96). However, the transportation of key management related data is not limited to ISO 8583. This International Standard is applicable to either symmetric or asymmetric cipher systems. Key management procedures for the secure manag

17、ement of the cryptographic keys within the retail banking environment are described in ISO 11568. Security related data, such as PIN data and MACs, are described in ISO 9564 and ISO 9807, respectively. 2 Normative references The following standards contain provisions which, through reference in this

18、 text, constitute provisions of this International Standard. At the time of publication, the editions indicated were valid. All standards are subject to revision, and parties to agreements based upon this International Standard are encouraged to investigate the possibility of applying the most recen

19、t edition of the standards indicated below. Members of IEC and ISO maintain registers of currently valid International Standards. ISO/IEC 7812-1:1993, Identification cards Identification of issuers Part 1: Numbering system. ISO/IEC 7812-2:1993, Identification cards Identification of issuers Part 2:

20、Application and registration procedures. ISO 8583:1993, Financial transaction card originated messages Interchange message specifications. ISO 8908:1993, Banking and related financial services Vocabulary and data elements. ISO 9564-1:1991, Personal Identification Number management and security Part

21、1: PIN protection principles and techniques. ISO 9807:1991, Banking and related financial services Requirements for message authentication (retail). ISO 11568-1:1994, Banking Key management (retail) Part 1: Introduction to key management. ISO 11568-2:1994, Banking Key management (retail) Part 2: Key

22、 management techniques for symmetric ciphers. ISO 11568-3:1994, Banking Key management (retail) Part 3: Key life cycle for symmetric ciphers. Copyright International Organization for Standardization Provided by IHS under license with ISO Licensee=NASA Technical Standards 1/9972545001 Not for Resale,

23、 04/20/2007 07:08:15 MDTNo reproduction or networking permitted without license from IHS -,-,- ISO 13492:1998(E) ISO 2 ANSI X3.92:1987, Data Encryption Algorithm. 3 Definitions For the purposes of this International Standard, the definitions given in ISO 8908 and the following definitions apply. 3.1

24、 asymmetric cipher a cipher in which the encipherment and decipherment keys are different and it is computationally infeasible to deduce the decipherment key from the encipherment key 3.2 cipher a pair of operations that effect transformations between plaintext and ciphertext under the control of a

25、parameter called a key NOTE The encipherment operation transforms data (plaintext) into an unintelligible form (ciphertext). The decipherment operation restores the original text. 3.3 cryptographic algorithm a set of rules specifying the procedures required to perform encipherment and decipherment o

26、f data NOTE The algorithm is designed so that it is not possible to determine the control parameters (e.g. keys) except by exhaustive search. 3.4 cryptographic key; key the control parameter of a cryptographic algorithm that cannot be deduced from the input and output data except by exhaustive searc

27、h 3.5 cryptographic service message a message for transporting keys or related information used to control a keying relationship 3.6 primary key that key for a transaction from which other keys for the transaction are produced (e.g. by means of variants or transformations) 3.7 symmetric cipher a cry

28、ptographic method using the same secret cryptographic key both for encipherment and decipherment 3.8 transaction message a message used to convey information related to a financial transaction 4 Requirements for key management related data element A key management related data element that conveys i

29、nformation about the associated transactions key(s) is normally divided into sub-fields. This data element may be transmitted in a transaction where the nature of the sub- fields are implicitly known to the communicating parties. In environments where such transactions are exchanged, the parties may

30、 use the key management related data element as a private-use field and define its sub-fields in any mutually agreeable way. In other environments, transactions are exchanged where the nature of the sub-fields Copyright International Organization for Standardization Provided by IHS under license wit

31、h ISO Licensee=NASA Technical Standards 1/9972545001 Not for Resale, 04/20/2007 07:08:15 MDTNo reproduction or networking permitted without license from IHS -,-,- ISOISO 13492:1998(E) 3 are not implicitly known and therefore must be structured using a standardized representation to support interoper

32、ability. However, other environments, both types of transactions may be exchanged. To distinguish between those transactions where the key management related data element must have a standardized representation and those transactions where it is used for private use, the first byte of the key manage

33、ment related data element shall be structured as a “control byte“, where the control byte is defined as follows: 00-9F:The first sub-field of the key management related data element is a variable-length “key set identifier,“ as defined in 4.1 and 4.2. A0-FF:The key management related data element is

34、 a private-use field, where the nature of the sub-fields are implicitly known to both communicating parties. The use of key set identifiers provides a standardized way to convey any type of key management related information associated with a key management system. This approach eliminates the need

35、to recognize specific key management techniques and to specify specific sub-fields to meet the needs of each such technique. When the key management related data element begins with a key set identifier, the remainder of the data element contains whatever type of information is required to determine

36、 the key(s) needed to cryptographically process the transaction. Thus, there is no specified structure to the sub-fields contained in the remainder of the data element. Any information that may vary on a per transaction basis is conveyed following the key set identifier. This information normally in

37、cludes the identity of a particular key(s) within a key set. Key management related information that does not change from one transaction to the next need not be conveyed with every transaction. Rather, it may be implicitly known, or it may be installed concurrent with, and stored in association wit

38、h, the corresponding key. Examples of information that may be implicitly known include the following: Key management technique used for the transactions keys (e.g. static key, unique key per transaction). Format of enciphered or authenticated data (e.g. PIN block format). Encipherment algorithm used

39、. Number of different keys used with the transaction and the purpose of each such key. In some key management schemes, it may not be necessary to transmit a key management related data element in transaction messages. The need to transmit such a data element is discussed in annex A. 4.1 Concept of k

40、ey set identifiers A key set identifier is a number that uniquely identifies a key set, where a key set is a group of related keys that are all different but have certain characteristics in common, most notably: All are managed using the same key management method. The same high level key is used to

41、 encipher (for database storage) or derive all keys of the set. The remainder of the key management related data element (beyond the key set identifier) is identically structured for all keys of the set and is interpreted using the same logic. Associated with any given key set is logic (e.g. compute

42、r software) at the acquiring host that may interpret the key management related data element to determine what key(s) is to be used with that transaction and how each such key is to be used. Multiple key sets, with different key set identifiers, may use the exact same logic, differing only, for exam

43、ple, in the key encipherment key or the derivation key used to decipher or derive the key for the associated transaction. Copyright International Organization for Standardization Provided by IHS under license with ISO Licensee=NASA Technical Standards 1/9972545001 Not for Resale, 04/20/2007 07:08:15

44、 MDTNo reproduction or networking permitted without license from IHS -,-,- ISO 13492:1998(E) ISO 4 The first byte of the key set identifier is the control byte (00-9F). Key set identifiers are assigned as described in 4.2. Key set identifiers are of variable length and do not have a specified maximu

45、m length. The length of the key set identifier is implicit. Therefore, the key management related data element shall not contain a “length“ sub-field preceding the key set identifier that indicates the length of the key set identifier. Similarly, it is unnecessary for the key set identifier to be fo

46、llowed by a specified delimiter. (Note that if the key management related data element is transmitted in a variable length field, the key management related data element itself may be preceded by a length sub-field indicating the length of the entire data element, as is required in ISO 8583 for data

47、 elements Security Related Control Information and Key Management Data.) Since key set identifiers are of variable length and the length is implicit, the acquiring host should store in the table of the key set identifiers that it recognizes the length of each key set identifier. When a host receives

48、 a transaction from, e.g. a POS terminal, the host should attempt to match the key set identifier in each such table entry with as many leftmost key management related data element digits as are specified for the particular table entry. Such a match indicates that this table entry holds the key set identifier that applies to the just-received key management related data element. 4.2 Assignment of key set identifiers To prevent institutions from assigning duplicate key set identifiers, key set identifiers sha

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 其他


经营许可证编号:宁ICP备18001539号-1