Specials

All specials

AS 2805.6.6-2006

AS 2805.6.6-2006

Electronic funds transfer - Requirements for interfaces Key management - Session keys - Node to node with KEK replacement

Standards Australia

More details

Download

PDF AVAILABLE FORMATS IMMEDIATE DOWNLOAD
$34.32

$78.00

(price reduced by 56 %)

Table of Contents

1 -  AS 2805.6.6-2006 ELECTRONIC FUNDS TRANSFER-REQUIREMENTS FOR INTERFACES - KEY MANAGEMENT-SESSION KEYS-NODE TO NODE WITH...
4 -  PREFACE
6 -  CONTENTS
7 -  1 SCOPE
7 -  2 APPLICATION
7 -  3 REFERENCED DOCUMENTS
8 -  4 DEFINITIONS
8 -  4.1 Acquirer
8 -  4.2 Acquirer network
8 -  4.3 Authentication
8 -  4.4 Back tracking
8 -  4.5 Cipher text
8 -  4.6 Completion message
8 -  4.7 Confirmation message
8 -  4.8 Data encipherment algorithm (DEA)
8 -  4.9 Data key (KD)
8 -  4.10 Decipherment
8 -  4.11 Digital signature
8 -  4.12 Dual control
8 -  4.13 Encipherment
9 -  4.14 Encipherment algorithm
9 -  4.15 Hash code
9 -  4.16 Secure Hash function
9 -  4.17 Identification
9 -  4.18 Key
9 -  4.19 Key enciphering key (KEK)
9 -  4.20 Key storage
9 -  4.21 Key verification code (KVC)
9 -  4.22 Link
9 -  4.23 MAC key (KMAC)
9 -  4.24 Message authentication code (MAC)
9 -  4.25 Modulo 2 addition
10 -  4.26 Node
10 -  4.27 Non°reversible transformation
10 -  4.28 One way function (OWF)
10 -  4.29 Personal identification number (PIN)
10 -  4.30 PIN block
10 -  4.31 PIN encipherment key (KPE)
10 -  4.32 Plain text
10 -  4.33 Private key (SK)
10 -  4.34 Public key (PK)
10 -  4.35 Public verification code (PVC)
10 -  4.36 Request message
10 -  4.37 Response message
10 -  4.38 Secret key
11 -  4.38.1 Security control module (SCM)
11 -  4.38.2 Session key (KS)
11 -  4.38.3 Sign
11 -  4.38.4 Statistically unique
11 -  4.38.5 Verify
11 -  5 OVERVIEW
11 -  5.1 General
11 -  5.2 Objectives of scheme
11 -  5.2.1 General
11 -  5.2.2 Different keys for each function
12 -  5.3 Key hierarchy and management
12 -  5.4 Key Establishment
12 -  6 DESCRIPTION OF FUNCTIONAL ELEMENTS
12 -  6.1 Key enciphering key variants (KEKV)
12 -  1.1.1
12 -  6.2 One Way Function (OWF)
12 -  6.3 Key Verification Code (KVC)
12 -  6.4 Formats
13 -  7 OPERATION
13 -  7.1 General
13 -  7.2 Initialization
13 -  7.2.1 General
13 -  7.2.2 Key Initialization
14 -  7.2.3 KEK Establishment
14 -  7.2.4 KEK Synchronization
15 -  7.2.5 Proof of endpoint
15 -  7.3 Changing session keys
15 -  7.3.1 General
15 -  7.3.2 Session key change
16 -  7.3.3 Synchronization of session key changes
16 -  7.3.4 Resynchronization
17 -  APPENDIX A - SYNCHRONIZATION OF KEY CHANGES

Abstract

This Standard specifies the management techniques for keys used in the authentication encipherment and the decipherment of electronic messages relating to financial transaction keys.

Scope

This Standard specifies management techniques for keys used in the authentication, encipherment and decipherment of electronic messages relating to financial transactions using session keys.
In particular, this Standard-
defines security interface procedures between nodes;
defines methods of interchange of the various encipherment keys used for securing transactions; and
ensures that messages can only be authenticated at their correct destination.
Principles concerning key management and physical security are dealt with in AS 2805.6.1.

General Product Information

Document Type Standard
Status Current
Publisher Standards Australia
ProductNote Pending Revision indicates that as a result of the Aged Standards review process, the document needs updating. If no project proposal, meeting the quality criteria, is received within the 12 month timeframe, the document shall be withdrawn.
Committee IT-005
Supersedes
  • DR 04136

Contact us