ASC X9 TR 34 2019 Interoperable Method For Distribution Of .

Transcription

This is a preview of "ASC X9 TR 34-2019". Click here to purchase the full version from the ANSI store.ASC X9 TR 34–2019Interoperable Method for Distribution ofSymmetric Keys using AsymmetricTechniques: Part 1 – Using Factoring-BasedPublic Key Cryptography Unilateral KeyTransportA Technical Report prepared by:Accredited Standards Committee X9, IncorporatedFinancial Industry StandardsRegistered with American National Standards InstituteDate Registered: September 22, 2019American National Standards, Technical Reports and Guides developed through the AccreditedStandards Committee X9, Inc., are copyrighted. Copying these documents for personal orcommercial use outside X9 membership agreements is prohibited without express writtenpermission of the Accredited Standards Committee X9, Inc. For additional information pleasecontact ASC X9, Inc., 275 West Street, Suite 107, Annapolis, Maryland 21401. ASC X9, Inc. 2019– All rights reserved

This is a preview of "ASC X9 TR 34-2019". Click here to purchase the full version from the ANSI store.ASC X9 TR 34–2019ContentsPage1Scope . 162References . 183Terms and definitions . 184Symbols and abbreviated terms . 5.4.85.4.95.55.5.15.5.25.5.35.5.45.5.5TR34 Protocol Overview . 23Introduction . 23Certificate Authority . 24High Level Protocol Description . 25Key Exchange Elements Description . 26Introduction . 26TR34 Attribute Header . 27TR34 Ephemeral Key . 29TR34 Replay Prevention . 29Introduction . 29Two Pass Protocol . 29One Pass Protocol . 30TR34 Certificate Revocation List (CRL) . 30The complete TR34 Key exchange message . 30Binding . 31Bind. 31Unbinding . 31Rebinding . 33Higher Level Authority Unbinding . 34Higher Level Authority Rebinding . 3566.16.26.2.16.2.26.3Key Block Properties and Characteristics . 37Key Block Elements . 37Key Block Binding Method . 38Secrecy . 39Integrity and Authenticity . 39Key Block Header . 3977.17.27.37.47.4.17.57.5.1Key Establishment Protocol – Unilateral Key Transport Method . 40Introduction . 40Bind / Unbind / Rebind States . 40Unbind / Rebind Scenarios. 41Parameters for Digital Signatures. 42Digital Signatures . 42KDH Bind Phase. 42Summary . 42ii ASC X9, Inc. 2019– All rights reserved

This is a preview of "ASC X9 TR 34-2019". Click here to purchase the full version from the ANSI store.ASC X9 TR re KRD Credential Token (A1) . 42Validate KRD Credential Token (B1) . 42Prepare KDH Credential Token (B2) . 43Validate KDH Credential (A2) . 43Symmetric Key Transport Phase . 44Summary . 44Generate Random Number Token (A1) . 44Receive Random Number Token (B1) . 44Generate transported Symmetric Key (B2) . 44Generate Ephemeral Symmetric Key (B3) . 45Encipher Key Block (B4) . 45Encipher Ephemeral Key (B5) . 45Construct Key Token (B6) . 45Verify Key Token (A2) . 45Symmetric Key Transport Phase - One-Pass Protocol Support . 46Summary . 46One-Pass Environment. 46Ensuring Message Freshness with TimeStamps . 46Implementing TimeStamps. 47Generate Transported Symmetric Key (B1) . 48Generate Ephemeral Symmetric Key (B2) . 48Encipher Key Block (B3) . 48Encipher Ephemeral Key (B4) . 48Construct Key Token (B5) . 48Verify Key Token (A1) . 48Symmetric Key Verification Phase . 50Summary . 50Generate Key Check Value (A1) . 50Verify Key Check Value (B1) . 50KDH Unbind Phase . 51Summary . 51Generate Random Number Token (A1) . 51Receive Random Number Token (B1) . 51Generate Unbind Token (B2) . 51Verify Unbind Token (A2) . 52KDH Rebind Phase . 53Summary . 53Generate Random Number Token (A1) . 53Receive Random Number Token (B1) . 53Generate Rebind Token (B2) . 53Verify Rebind Token (A2) . 54Higher Level Authority Unbind Phase . 55Summary . 55Generate Random Number Token (A1) . 55Receive Random Number Token (B1) . 55Generate Unbind Token (B2) . 55Verify Unbind Token (A2) . 56 ASC X9, Inc. 2019– All rights reservediii

This is a preview of "ASC X9 TR 34-2019". Click here to purchase the full version from the ANSI store.ASC X9 TR 34–20197.127.12.17.12.27.12.37.12.47.12.5Higher Level Authority Rebind Phase . 56Summary . 56Generate Random Number Token (A1) . 57Receive Random Number Token (B1) . 57Generate Rebind Token (B2) . 57Verify Rebind Token (A2) . 57Annex A (Informative) Design Considerations . 58A.1Assumptions and Constraints . 58A.1.1 Assumptions . 58A.1.2 Constraints . 58A.2Recommended Algorithms. 59A.2.1 General . 59A.2.2 Signature Algorithms. 59A.2.3 Encryption Algorithms . 59A.2.4 OAEP Parameters . 59A.2.5 Message Digest Functions . 61A.2.6 Key Sizes and Characteristics . 62Annex B (Informative) Cryptographic Message Encodings . 65B.1Overview . 65B.2Test Vectors . 65B.2.1 Sample Keys . 65B.2.2 Sample Data . 73B.3Root Certificate Authority Public Key Certificate . 96B.4CAKDH – Certificate Authority – KDH Certificate .100B.5CAKRD – Certificate Authority – KRD Certificate .104B.6CTKDH – The KDH Credential Token .108B.7CTKRD - The KRD Credential Token .114B.8KTKDH – The KDH Key Token – 1 Pass TDEA.118B.8.1 1 Pass Key Token .121B.9KTKDH – The KDH Key Token – 2 Pass TDEA.127B.9.1 2 Pass Key Token .130B.10 RBTCA UNBIND – Higher Level Authority Rebind Token .135B.11 RBTKDH – KDH Rebind Token .143B.12 RTKRD – KRD Random Number Token .152B.13 UBTCA UNBIND – Higher Level Authority Unbind Token .153B.14 UBTKDH – KDH Unbind Token .157Annex C (Normative) ASN.1 Module for Object Identifiers .162Annex D (Normative) ASN.1 Module for TR34 CMS .164iv ASC X9, Inc. 2019– All rights reserved

This is a preview of "ASC X9 TR 34-2019". Click here to purchase the full version from the ANSI store.ASC X9 TR 34–2019FiguresFigure 1 . 23Figure 2 . 24Figure 3 — Comparison of TR-31 and TR-34 Key Binding Methods . 37Figure 4 — Key Block Binding Method using CMS types . 38Figure 5 — Binding States . 41TablesTable 1 — KDH Response and Phase. 40Table 2 — Unbind / Rebind Scenarios . 41Table 3— KDH Bind Phase . 42Table 4 — Symmetric Key Transport Phase . 44Table 5 - Symmetric Key Transport Phase - One-Pass Protocol. 46Table 6 — Symmetric Key Verification Phase. 50Table 7 — KDH Unbind Phase . 51Table 8 — KDH Rebind Phase . 53Table 9 — Higher Level Authority Unbind Phase . 55Table 10 — Higher Level Authority Rebind Phase . 56Table 11 - Supported Signature Algorithms . 59Table 12 - Supported Asymmetric Encryption Algorithms . 59Table 13 - Supported Message Digest Functions . 61Table 14 - Supported Key Sizes and Characteristics . 62Table 15 - Ephemeral Key types and Strengths. 63Table 16 - Transported Key Types and Strengths . 64

Transport A Technical Report prepared by: Accredited Standards Committee X9, Incorporated Financial Industry Standards Registered with American National Standards Institute Date Registered: September 22, 2019 American National Standards, Technical Reports and Guides developed through the Accredited Standa