AS 2805.6.1.4:2009 pdf download

From:Internet 2022-10-01 17:12

Abstract: AS 2805.6.1.4:2009 pdf download.Electronic funds transfer—Requirements for interfaces Part 6.1.4: Key management—Asymmetric cryptosystems-Keymanagement and life cycle. 3.14 key share one of at least two parameters related to a cryptogra...

AS 2805.6.1.4:2009 pdf download.Electronic funds transfer—Requirements for interfaces Part 6.1.4: Key management—Asymmetric

cryptosystems-Keymanagement and life cycle.

3.14

key share

one of at least two parameters related to a cryptographic key generated in such a way that a quorum of such parameters can be

combined to form the cryptographic key but such that fewer than a quorum provide no information about the key

3.15

non-repudiation of origin

property that the oreginator of a message and associated cryptographic check value (i.e., digital signature) is not able to

subsequently deny, with an accepted level of credibility, having originated the message

4 Uses of asymmetric cryptosystems in retail financial services systems

4.1 General

Asymmetric cryptosystems include asymmetric ciphers. digital signature systems and key agreement systems.

In financial services systems, asymmetric cryptosystems are used predominantly for key management; firstly foi- the management of

the keys of symmetric ciphers, and secondly for the management of the keys of the asymmetric cryptosystems themselves. This clause describes these applications of asymmetric cryptosystems. Clause 5 describes the techniques employed in support of these

applications relating to key management services and certificate management. Clause 6 describes how these techniques and methods

are used in relation to the security and implementation requirements for the key pair life cycle.


Recommended:

Download Address
Related Standards