Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GB/T 27909.2-2011 English PDF

US$689.00 · In stock
Delivery: <= 5 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 27909.2-2011: Banking -- Key management (retail) -- Part 2: Symmetric ciphers -- Key management and life cycle
Status: Valid
Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB/T 27909.2-2011689 Add to Cart 5 days Banking -- Key management (retail) -- Part 2: Symmetric ciphers -- Key management and life cycle Valid

Similar standards

JR/T 0197   JR/T 0154   GB/T 19584   GB/T 27929   GB/T 27913   GB/T 27909.1   

Basic data

Standard ID: GB/T 27909.2-2011 (GB/T27909.2-2011)
Description (Translated English): Banking -- Key management (retail) -- Part 2: Symmetric ciphers -- Key management and life cycle
Sector / Industry: National Standard (Recommended)
Classification of Chinese Standard: A11
Classification of International Standard: 35.240.40
Word Count Estimation: 30,339
Date of Issue: 2011-12-30
Date of Implementation: 2012-02-01
Quoted Standard: GB/T 27909.1-2011; GB/T 20547.2-2006; GB/T 21078.1-2007; GB/T 21079.1; ISO/IEC 10116; ISO 16609-2004; ISO/IEC 18033-1; ISO/TR 19038-2005; ANSI X9.24 1-2004; ANSI X9.65
Adopted Standard: ISO 11568-2-2005, MOD
Regulation (derived from): Announcement of Newly Approved National Standards No. 23 of 2011
Issuing agency(ies): General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China
Summary: This standard specifies the retail financial services environment, when using symmetric cryptography mechanism symmetric and asymmetric key protection technology, but also describes a symmetric key associated with the life cycle management. The techniques described in this section comply with GB/T 27909. 1 principle described. The techniques described in this section apply to any symmetric key management operations. The symbols used in this section see Appendix A. This section describes the technology involved in the algorithm should be consistent with the State Password Administration department of the relevant provisions.

GB/T 27909.2-2011: Banking -- Key management (retail) -- Part 2: Symmetric ciphers -- Key management and life cycle


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
. Banking Key management (retail) Part 2. Symmetric ciphers Key management and life cycle ICS 35.240.40 A11 National Standards of People's Republic of China Banking - Key management (retail) Part 2. Symmetric ciphers and key management And life cycle Banking-Keymanagement (retail) - Part 2. Symmetricciphers-Keymanagementandlifecycle (ISO 11568-2.2005, MOD) Issued on. 2011-12-30 2012-02-01 implementation Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China Standardization Administration of China released

Table of Contents

Introduction Ⅲ Introduction Ⅳ 1 Scope 1 2 Normative references 1 3 Terms and definitions General Environmental Management Technology 4 key 3 4.1 Overview 3 4.2 features password security device 3 4.3 key generation 4 4.4 key calculation (deformation) 5 Key rating 4.5 5 4.6 Key Lifecycle 6 4.7 key storage 6 Reacquire 4.8 backup key 8 4.9 Key distribution and import 9 Key Usage 9 4.10 Replacing the key 10 4.11 Key destruction 10 4.12 4.13 Delete key 10 4.14 Key Archive 10 4.15 termination key 10 5 provides key management technology and services 10 5.1 Introduction 10 11 5.2 Key Encryption 11 5.3 Key deformation 5.4 key derivation 11 12 5.5 Key Transformation 5.6 Key offset 13 13 5.7 Key notary 5.8 key tag 14 15 5.9 Key Authentication Key identification 15 5.10 Control and audit 15 5.11 16 5.12 Key Integrity 6 symmetric key lifecycle 16 6.1 Overview 16 6.2 key generation 16 6.3 key storage 17 Restore 6.4 backup key 17 6.5 Key Distribution and import 17 19 6.6 Key Usage 19 6.7 Key replacement 6.8 Key destroy, delete, archive, and terminate 19 7 Key Management Service Control Reference 20 Appendix A (normative) Symbols used in this section 21 Appendix B (normative) Acronyms 22 References 23

Foreword

GB/T 27909 "Banking - Key management (retail)" is divided into the following three parts. --- Part 1. General principles; --- Part 2. Symmetric ciphers and key management and life cycle; --- Part 3. asymmetric cryptography and key management and life cycle. This part of GB/T 27909 Part 2. This section drafted in accordance with GB/T 1.1-2009 given rules. The partial modification of international standard ISO 11568-2.2005 "Banking - Key management (retail) - Part 2. symmetric cryptosystem EC and its key management and life cycle "(in English). When adopting ISO 11568-2 made the following changes. Remove the "ISO 11568-2 Appendix B approved symmetric key management algorithms," explains techniques as described in this section in Chapter 1 Algorithm involved should comply with the relevant provisions of the state password administration. This section also made the following editorial changes. a) Normative references to international standards in the document referenced in corresponding national standards, references to the national standards; b) Delete ISO foreword. This section proposed by the People's Bank of China. This part of the National Standardization Technical Committee on Finance (SAC/TC180) centralized. This section is responsible for drafting units. China Financial Computerization Corporation. Participated in the drafting of this section. People's Bank of China, Industrial and Commercial Bank of China, Agricultural Bank of China, Bank of China, Bank of Communications, China Everbright Bank of China Unionpay. The main drafters of this section. Wang Ping baby, Lushu Chun, Li Shuguang, Zhao Zhilan, Zhouyi Peng, Zhao Hongxin, Cheng Guan, Liu Yao, Yu Guodong, Yangzeng Yu, Huang Faguo.

Introduction

GB/T 27909 describes a process safety management in key retail financial services environment, such as the keys used to protect the acquirer Between the parties and the acceptance packet acquirer and card issuer between. This section describes the retail financial services sector in the applicable key management requirements, a typical type of service have sales/service points (POS) and ATM authorize borrowing record (ATM) transactions. When using the key management GB/T 27909 sections describe the combination can provide key management in GB/T 27909.1 described Management services. These services include. --- Key separation; --- Prevent the key replacement; --- Key authentication; --- Key Sync; --- Key Integrity; --- Key confidentiality; --- Key leak detection. Control Key Management Service and the corresponding reference key management technologies, see Chapter 7. This section describes the use of symmetric cryptography mechanism, key security management involved in key life cycle. According to GB/T 27909.1 And this part of the key management principles, services and technologies described in this section also specifies the various stages of the life of the key requirements and implementations law. This section does not involve asymmetric cryptographic key management mechanism or life cycle, the contents of this aspect see GB/T 27909.3. When this part of the development, give full consideration to the ISO /IEC 11770 standards. This section describes the use of technology and meet the needs of the financial services industry. Banking - Key management (retail) Part 2. Symmetric ciphers and key management And life cycle

1 Scope

This section describes the retail financial services environment, when using symmetric and asymmetric cryptographic protection mechanism asymmetric key technologies, and also describes Said the symmetric key associated with the life cycle management. The techniques described in this section in line with GB/T 27909.1 principles described. Techniques described in this section apply to any asymmetric key management operations. Symbols used in this section, see Appendix A. This section describes the algorithm technology involved to comply with the relevant provisions of the state password administration.

2 Normative references

The following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein Member. For undated references, the latest edition (including any amendments) applies to this document. GB/T 27909.1-2011 Banking - Key management (retail) - Part 1. General principles (ISO 11568-1.2005, MOD) GB/T 20547.2-2006 Banking Secure cryptographic devices (retail) - Part 2. Financial transaction device security compliance Detection Listing (ISO 13491-2.2005, MOD) GB/T 21078.1-2007 Banking Personal Identification Number management and security - Part 1. ATM and POS systems in the United The basic principles and requirements for machine PIN processing (ISO 9564-1.2002, MOD) GB/T 21079.1 Banking Secure cryptographic devices (retail) - Part 1. Concepts, requirements and evaluation methods (GB/T 21079.1- 2007, ISO 13491-1.1998, MOD) Operation ISO /IEC 10116 Information technology - Security techniques n-bit block cipher ISO 16609.2004 Banking technology using symmetric message authentication requirements ISO /IEC 18033-1 Information technology - Security techniques - Encryption algorithms - Part 1. Summary ISO /T R19038.2005 Banking and related financial services - Triple DEA operation mode Implementation Guide ANSIX9.24Part 1-2004 retail financial services symmetric key management - Part 1. using symmetric techniques ANSIX9.65 Triple Data Encryption Algorithm (3-DEA), the implementation of standards

3 Terms and Definitions

The following terms and definitions apply to this document. 3.1 Password cipher Under the control parameter called the key to realize pair of operation between the plaintext and ciphertext conversion. NOTE. Data encryption (plain text) into cipher text into unreadable; decryption operation ciphertext back into plaintext.
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 27909.2-2011_English be delivered?

Answer: Upon your order, we will start to translate GB/T 27909.2-2011_English as soon as possible, and keep you informed of the progress. The lead time is typically 3 ~ 5 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 27909.2-2011_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 27909.2-2011_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.