Abstract: AS 2805.6.1.4:2009 pdf download.Electronic funds transfer—Requirements for interfaces Part 6.1.4: Key management—Asymmetric cryptosystems-Keymanagement and life cycle. 3.14 key share one of at least two parameters related to a cryptogra...
AS 2805.6.1.4:2009 pdf download.Electronic funds transfer—Requirements for interfaces Part 6.1.4: Key management—Asymmetric
cryptosystems-Keymanagement and life cycle.
3.14
key share
one of at least two parameters related to a cryptographic key generated in such a way that a quorum of such parameters can be
combined to form the cryptographic key but such that fewer than a quorum provide no information about the key
3.15
non-repudiation of origin
property that the oreginator of a message and associated cryptographic check value (i.e., digital signature) is not able to
subsequently deny, with an accepted level of credibility, having originated the message
4 Uses of asymmetric cryptosystems in retail financial services systems
4.1 General
Asymmetric cryptosystems include asymmetric ciphers. digital signature systems and key agreement systems.
In financial services systems, asymmetric cryptosystems are used predominantly for key management; firstly foi- the management of
the keys of symmetric ciphers, and secondly for the management of the keys of the asymmetric cryptosystems themselves. This clause describes these applications of asymmetric cryptosystems. Clause 5 describes the techniques employed in support of these
applications relating to key management services and certificate management. Clause 6 describes how these techniques and methods
are used in relation to the security and implementation requirements for the key pair life cycle.
Recommended: