ANSI-TG-19-4-2001.pdf
《ANSI-TG-19-4-2001.pdf》由会员分享,可在线阅读,更多相关《ANSI-TG-19-4-2001.pdf(23页珍藏版)》请在三一文库上搜索。
1、 American National Standard for Financial Services TG-19:42001 TG-19, Part 4: The Secure Hash Algorithm Validation System (SHAVS) for ANSI X9.30:2 Secretariat: Accredited Standards Committee X9, Inc. Approved: June 2001 American National Standards Institute Copyright American National Standards Inst
2、itute Provided by IHS under license with ANSI Licensee=USN Ship Repair Facility Yokosuka/9961031100 Not for Resale, 05/08/2007 22:50:42 MDTNo reproduction or networking permitted without license from IHS -,-,- ANS TG-19:42001 ii 2001 All rights reserved No part of this publication may be reproduced
3、in any form, in an electronic retrieval system or otherwise, without prior written permission of the American Bankers Association. Printed in the United States of America. Published by: Accredited Standards Committee X9, Inc. P.O. Box 4035 Annapolis, Maryland 21403 USA Phone: 410-267-7707 or 301-879
4、-7988 Fax: 301-879-5124 Email: Cindy.FullerX9.org Isabel.BaileyX9.org X9 Online: http:/www.x9.org Copyright 2001 Accredited Standards Committee X9, Inc. All rights reserved No part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without prior writte
5、n permission of the publisher. Printed in the United States of America Copyright American National Standards Institute Provided by IHS under license with ANSI Licensee=USN Ship Repair Facility Yokosuka/9961031100 Not for Resale, 05/08/2007 22:50:42 MDTNo reproduction or networking permitted without
6、license from IHS -,-,- ANS TG-19:42001 2001 All rights reserved iii Contents Forward.iv 1 Introduction1 2 Scope 1 3 Conformance1 4 Normative reference1 5 Definitions, Symbols, and Abbreviations2 5.1 Definitions 2 5.2 Symbols2 5.3 Abbreviations.3 6 Organization.3 7 Design Philosophy Of The Secure Has
7、h Algorithm Validation System.3 8 The SHAVS Tests Description4 8.1 Configuration Information 4 8.2 The Short Messages Test .5 8.2.1 The Short Messages Test for Bit-Oriented Implementations5 8.2.2 The Short Messages Test for Byte-Oriented Implementations.6 8.3 The Selected Long Messages Test6 8.3.1 T
8、he Selected Long Messages Test for Bit-Oriented Implementations.7 8.3.2 The Selected Long Messages Test for Byte-Oriented Implementations8 8.4 The Pseudorandomly Generated Messages Test.8 Annex A Sample Values for the SHA-1 Tests (informative) .11 A.1 Examples Of The Short Messages Test.11 A.2 Examp
9、les Of The Selected Long Messages Test.11 A.3 Examples of The Pseudorandomly Generated Messages Test12 Annex B Bibliography (informative) .13 Copyright American National Standards Institute Provided by IHS under license with ANSI Licensee=USN Ship Repair Facility Yokosuka/9961031100 Not for Resale,
10、05/08/2007 22:50:42 MDTNo reproduction or networking permitted without license from IHS -,-,- ANS TG-19:42001 iv 2001 All rights reserved Forward Business practice has changed with the introduction of computer-based technologies. The substitution of electronic transactions for their paper-based pred
11、ecessors has reduced costs and improved efficiency. Trillions of dollars in funds and securities are transferred daily by telephone, wire services, and other electronic communication mechanisms. The high value or sheer volume of such transactions within an open environment exposes the financial comm
12、unity and its customers to potentially severe risks from accidental or deliberate alteration, substitution or destruction of data. Interconnected networks, and the increased number and sophistication of malicious adversaries compound this risk. Some of the conventional “due care” controls used with
13、paper-based transactions are unavailable in electronic transactions. Examples of such controls are safety paper that protects integrity, and hand-written signatures or embossed seals that indicate the intent of the originator to be legally bound. In an electronic-based environment, controls must be
14、in place that provide the same degree of assurance and certainty as in a paper environment. The financial community is responding to these needs. This Guideline, ANSI X9-TG-19:4: Secure Hash Algorithm Validation System (SHAVS) for ANSI X9.30:2 specifies the procedures involved in validating implemen
15、tations of the Secure Hash Algorithm in ANSI X9.30:2-1997, The Secure Hash Algorithm (SHA-1) (Revised). This Guideline supplements the procedures specified in ASC X9 SD-012, Guideline for Validating Implementations Conforming to ANSI Standards. When applied to an Implementation Under Test (IUT) that
16、 implements SHA-1, SHAVS provides testing to determine the correctness of the algorithm implementation. In addition to determining conformance, the SHAVS is structured to detect implementation flaws, including pointer problems, insufficient allocation of space, improper error handling, and incorrect
17、 behavior of the SHA-1 implementation. While the techniques specified in this Guideline are designed to specify validation requirements and procedures for implementations of the Secure Hash Algorithm, the Guideline does not guarantee that a particular implementation meets the requirement of the X9.3
18、0:2-1997 Standard and prudent practices. It is the responsibility of the financial institution to put an overall process in place with the necessary controls to ensure that the process is securely implemented. Furthermore, the controls should include the application of appropriate audit tests in ord
19、er to verify compliance with this Guideline. Suggestions for the improvement or revision of this Guideline are welcome. They should be sent to Accredited Standards Committee X9, Inc., P.O. Box 4035, Annapolis, Maryland, 21403, USA. This Guideline was processed and approved for submittal to ANSI by t
20、he Accredited Standards Committee on Financial Services, X9. Committee approval of the Guideline does not necessarily imply that all the committee members voted for its approval. The X9 Committee had the following members : Harold G. Deal, X9 Chairman William E. Lyons, X9 Vice-Chairman Cynthia L. Fu
21、ller, Managing Director Darlene J. Schubert, Program Manager Copyright American National Standards Institute Provided by IHS under license with ANSI Licensee=USN Ship Repair Facility Yokosuka/9961031100 Not for Resale, 05/08/2007 22:50:42 MDTNo reproduction or networking permitted without license fr
22、om IHS -,-,- ANS TG-19:42001 2001 All rights reserved v Organization Represented Representative American Bankers Association Anne Livingston Kawika Daguio American Express Company Bonnie Howard Applied Communications Douglas Grote Cindy Rink Automated Financial Services Tom Clute Banc One Corporatio
23、n William Lyons Bank of America Gretchen Breiling Bankers Roundtable Kit Needlam Keviar Warner Canadian Bankers Association Christine Arjoonlal Mara Bakic Chase Manhattan Bank Christopher Dowdell Francis Keenan Certicom Corporation Donald Johnson Citibank Seymour Rosen Cybersafe Corporation Glenda B
24、arnes Deluxe Corporation Maury Jansen Ernst for a given real positive x, x = x - g, where x is a non-negative integer and 0g1. lmin Minimum message length for Selected Long Message Test lmax Maximum message length for Selected Long Message Test m Number of bits in the message block Copyright America
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSI TG 19 2001
链接地址:https://www.31doc.com/p-3729352.html