ANSI-X9.30-1-1997.pdf
《ANSI-X9.30-1-1997.pdf》由会员分享,可在线阅读,更多相关《ANSI-X9.30-1-1997.pdf(29页珍藏版)》请在三一文库上搜索。
1、Copyright American National Standards Institute Provided by IHS under license with ANSI Licensee=USN Ship Repair Facility Yokosuka/9961031100 Not for Resale, 05/08/2007 22:01:57 MDTNo reproduction or networking permitted without license from IHS -,-,- Copyright American National Standards Institute
2、Provided by IHS under license with ANSI Licensee=USN Ship Repair Facility Yokosuka/9961031100 Not for Resale, 05/08/2007 22:01:57 MDTNo reproduction or networking permitted without license from IHS -,-,- American National Standard for Financial Services X9.30: 1-1997, Public Key Cryptography For The
3、 Financial Services Industry: Part 1: The Digital Signature Algorithm SA) (Revision of X9.3O:l-1995) Secretariat American Bankers Association Approved: January 30,1997 American National Standards Institute Copyright American National Standards Institute Provided by IHS under license with ANSI Licens
4、ee=USN Ship Repair Facility Yokosuka/9961031100 Not for Resale, 05/08/2007 22:01:57 MDTNo reproduction or networking permitted without license from IHS -,-,- American National Standard Approval of an American National Standard requires verification by ANSI that the requirements for due process, cons
5、ensus, and other criteria for approval have been met by the standards developer. Consensus is established when, in the judgment of the ANSI Board of Standards Review, substantial agreement has been reached by directly and materially affected interests. Substantial agreement means much more than a si
6、mple majority, but not necessarily unanimity. Consensus requires that all views and objections be considered, and that a concerted effort be made toward their resolution. The use of American National Standards is completely voluntary; their existence does not in any respect preclude anyone, whether
7、he has approved the standards or not from manufacturing, marketing, purchasing, or using products, processes, or procedures not conforming to the standards. The American National Standards Institute does not develop standards and will in no circumstances give an interpretation of any American Nation
8、al Standard. Moreover, no person shall have the right or authority to issue an interpretation of an American National Standard in the name of the American National Standards Institute. Requests for interpretations should be addressed to the secretariat or sponsor whose name appears on the title page
9、 of this standard. CAUTION NOTICE This American National Standard may be revised or withdrawn at any time. The procedures of the American National Standards Institute require that action be taken to reaffm, revise, or withdraw this standard no later than five years from the date of approval. Publish
10、ed by American Bankers Association 1120 Connecticut Avenue, N W Washington, DC 20036 USA Customer Service Center 1 (800) 33 the two keys have the property that, given the public key, it is computationaily infeasible to derive the private key. The public key and identity of an entity together with so
11、me other information, rendered unforgeable by signing it with the private key of the certiQing authority which issued it. A Center trusted by one or more entities to create and assign certifcates. The discipline which embodies principles, means and methods for the transformation of data in order to
12、hide its information content, prevent its undetected modification, prevent its unauthorized use or a combination thereof. The time span during which a specific key is authorized for use or in which the keys for a given system may remain in effect. A parameter that determines the operation of a crypt
13、ographic function such as: 1. 2. 3. the transformation from plain text to cipher text and vice versa, the synchronized generation of keying material, a digital signature computation or validation. A cryptographic transformation of data which, when appended to a data unit, provides the services of 1.
14、 origin authentication, -1- Copyright American National Standards Institute Provided by IHS under license with ANSI Licensee=USN Ship Repair Facility Yokosuka/9961031100 Not for Resale, 05/08/2007 22:01:57 MDTNo reproduction or networking permitted without license from IHS -,-,- American National St
15、andard x930.1-1997 2. data integrity, and 3. signer non-repudiation Hash A (mathematical) function which maps values from a large ossibly very large) domain into a smaller range. It may be used to reduce a potentially long message into a “hash value” or “message digest” which is sufficiently compact
16、 to be input into a digital signature algorithm. A good hash is such that the results of applying the function to a (large) set of values in the domain will be evenly (and randomly) distributed over the range. Key See Cryptographic Key. Keying Material The data (e.g., keys, certificates and initiali
17、zation vectors) necessary to establish and maintain cryptographic keying relationships. A communication containing one or more transactions or related information. A field which may be used to identifj a message or transaction. Typically, this field is a sequence number. Message Message identifier (
18、MID) Non-repudiation Owner Private key Public Key This service provides proof of the integrity and origin of data which can be verified by a third party. The party whose identity is associated with a private/public key pair. In an asymmetric (public) key cryptosystem, that key of an entitys key pair
19、 which is known only by that entity. In an asymmetric key system, that key of an entitys key pair which is publicly known. Signatory The entity that generates a digital signature on data. Verifier The entity that verifies the authenticity of a digital signature. 2.2. Common Abbreviations and Acronym
20、s This section contains abbreviations and acronyms commonly used in this standard. ABBREVIATION M E A ” G MID Message Identifier mod modulo -2- Copyright American National Standards Institute Provided by IHS under license with ANSI Licensee=USN Ship Repair Facility Yokosuka/9961031100 Not for Resale
21、, 05/08/2007 22:01:57 MDTNo reproduction or networking permitted without license from IHS -,-,- American National Standard x930:1-1997 mod n V e II SHA-l(m) arihmetic modulo n bitwise logical “inclusive-or” bitwise logical “exclusive-or” concatenation the result of a hash computation (message digest
22、) on message rn using the SHA-1 as defined in ANSI X9.30- 1997, Part 2: The Secure Hash Algorithm (SIL4-1) (Revised) 3 . Application 3.1. General When information is transmitted from one party to another, the recipient may desire to know that the information has not been altered in transit. Furtherm
23、ore, the recipient may wish to be certain of the originators identity. Both of these services can be provided by the DSA. A digital signature is an electronic analog to a written signature, in that the digital signature may be used in proving to a third party that the information was, in fact, signe
24、d by the claimed originator. Unlike their written counterparts, digital signatures also verify the integrity of information. Digital signatures may also be generated for stored data and programs so that the integrity of the data and programs may be verified at any later time. 3 . 2 . The Use of the
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSI X9 30 1997
链接地址:https://www.31doc.com/p-3731166.html