ANSI-X9.96-2004.pdf
《ANSI-X9.96-2004.pdf》由会员分享,可在线阅读,更多相关《ANSI-X9.96-2004.pdf(63页珍藏版)》请在三一文库上搜索。
1、National Standard for Financial Services X9.96-2004 XML Cryptographic Message Syntax (XCMS) Secretariat: Accredited Standards Committee X9, Incorporated Approved: June 3, 2004 American National Standards Institute Copyright American National Standards Institute Provided by IHS under license with ANS
2、I Licensee=USN Ship Repair Facility Yokosuka/9961031100 Not for Resale, 05/08/2007 19:42:18 MDTNo reproduction or networking permitted without license from IHS -,-,- Copyright American National Standards Institute Provided by IHS under license with ANSI Licensee=USN Ship Repair Facility Yokosuka/996
3、1031100 Not for Resale, 05/08/2007 19:42:18 MDTNo reproduction or networking permitted without license from IHS -,-,- X9.96 XML Cryptographic Message Syntax (XCMS) Foreword Approval of an American National Standard requires verification by ANSI that the requirements for due process, consensus, and o
4、ther criteria for approval have been met by the standards developer. Consensus is established when, in the judgment of the ANSI Board of Standards Review, substantial agreement has been reached by directly and materially affected interests. Substantial agreement means much more than a simple majorit
5、y, but not necessarily unanimity. Consensus requires that all views and objections be considered, and that a concerted effort be made toward their resolution. The use of American National Standards is completely voluntary; their existence does not in any respect preclude anyone, whether he has appro
6、ved the standards or not from manufacturing, marketing, purchasing, or using products, processes, or procedures not conforming to the standards. The American National Standards Institute does not develop standards and will in no circumstances give an interpretation of any American National Standard.
7、 Moreover, no person shall have the right or authority to issue an interpretation of an American National Standard in the name of the American National Standards Institute. Requests for interpretations should be addressed to the secretariat or sponsor whose name appears on the title page of this sta
8、ndard. CAUTION NOTICE: This American National Standard may be revised or withdrawn at any time. The procedures of the American National Standards Institute require that action be taken to reaffirm, revise, or withdraw this standard no later than five years from the date of approval. Published by Acc
9、redited Standards Committee X9, Incorporated Financial Industry Standards P. O. Box 4035 Annapolis, MD 21403 http:/www.x9.org/ Copyright 2004 by Accredited Standards Committee X9, Incorporated All rights reserved. No part of this publication may be reproduced in any form, in an electronic retrieval
10、system or otherwise, without prior written permission of the publisher. Printed in the United States of America 2004 ASC X9, Inc. All rights reserved Page 1 Copyright American National Standards Institute Provided by IHS under license with ANSI Licensee=USN Ship Repair Facility Yokosuka/9961031100 N
11、ot for Resale, 05/08/2007 19:42:18 MDTNo reproduction or networking permitted without license from IHS -,-,- X9.96 XML Cryptographic Message Syntax (XCMS) Contents Foreword .1 Introduction.3 1 Scope8 2 Normative references8 3 Terms, definitions, symbols and abbreviated terms.10 4 Organization.13 5 A
12、pplication.13 6 Message Structures 14 6.1 Encapsulated Content.14 6.2 Signed Data17 6.2.1 Schema Definition.17 6.2.2 Signed Attributes.21 6.2.3 Unsigned Attributes32 6.2.4 Certificate Formats34 6.2.5 Detached Signatures.34 6.2.6 Signature Process.35 6.3 Authenticated Data35 6.3.1 MAC and HMAC Creati
13、on.37 6.3.2 MAC and HMAC Verification.38 6.4 Digested Data.39 6.5 Encrypted Data40 6.6 Named Key Encrypted Data .41 6.7 Enveloped Data42 6.7.1 General .42 6.7.2 Certificate Formats44 7 Key Management.44 7.1 General .44 7.2 Asymmetric Key Transport.44 7.3 Asymmetric Key Agreement 45 7.4 Pre-establish
14、ed Key Encryption Keys.46 7.5 External Mechanisms Constructive Key Management.46 8 Conformance Classes.46 Annex A (normative) XML CMS Object Identifiers .48 Annex B (normative) XML CMS Schema.52 Bibliography61 2004 ASC X9, Inc. All rights reserved Page 2 Copyright American National Standards Institu
15、te Provided by IHS under license with ANSI Licensee=USN Ship Repair Facility Yokosuka/9961031100 Not for Resale, 05/08/2007 19:42:18 MDTNo reproduction or networking permitted without license from IHS -,-,- X9.96 XML Cryptographic Message Syntax (XCMS) Introduction NOTE: The users attention is calle
16、d to the possibility that compliance with this standard may require the use of an invention covered by patent rights. By publication of this standard, no position is taken with respect to the validity of this claim or of any patent rights in connection therewith. The patent holder has, however, file
17、d a statement of willingness to grant a license under these rights on reasonable and non-discriminatory terms and conditions to applicants desiring to obtain such a license. Details may be obtained from the standards developer. Suggestions for the improvement or revision of this Standard are welcome
18、. They should be sent to the ASC X9, Inc., P.O. Box 4035, Annapolis, MD 21403. This Standard was processed and approved for submittal to ANSI by the Accredited Standards Committee on Financial Services, X9. Committee approval of the Standard does not necessarily imply that all the committee members
19、voted for its approval. The X9 committee had the following members: Gene Kathol, Chairman Vincent DeSantis, Vice Chairman Cynthia L. Fuller, Executive Director Isabel Bailey, Managing Director ORGANIZATION NAME ACI Worldwide Jim Shaffer American Express Company Mike Jones American Financial Services
20、 Association Mark Zalewski Bank of America Daniel Welch Bank One Corporation Jacqueline Pagan BB and T Woody Tyner Cable the two keys have the property that, given the public key, it is computationally infeasible to derive the private key. 3.3 certificate digital certificate The public key and ident
21、ity of an entity, together with some other information, that is rendered unforgeable by signing the certificate with the private key of the Certification Authority that issued the certificate. 3.4 Certificate Authority CA An entity trusted by one or more other entities to create and assign certifica
22、tes. 3.5 certificate revocation list CRL A list of digital certificates that have been revoked for one reason or another usually because of compromise. 3.6 constructive key management CKM A method of establishing a key, whereby several components of keying material, both symmetric and asymmetric typ
23、e of keys, where each component is used for a specific purpose, are combined together using a mathematical function to produce an object key. 3.7 content encryption key CEK The symmetric key used to encrypt the content of a message. 3.8 cryptographic hash function hash A (mathematical) function that
24、 maps values from a large (possibly very large) domain into a smaller range. The function satisfies the following properties: 1. (One-way) It is computationally infeasible to find any input that maps to any pre-specified output; 2. (Collision Free) It is computationally infeasible to find any two di
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSI X9 96 2004
链接地址:https://www.31doc.com/p-3729978.html