Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GB/T 27927-2011 English PDF

US$1059.00 · In stock
Delivery: <= 7 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 27927-2011: Banking and related financial services -- Triple DEA-Modes of operation -- Implementation guidelines
Status: Valid
Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB/T 27927-20111059 Add to Cart 7 days Banking and related financial services -- Triple DEA-Modes of operation -- Implementation guidelines Valid

Similar standards

JR/T 0197   JR/T 0154   GB/T 19584   GB/T 27929   GB/T 27926.2   GB/T 27926.1   

Basic data

Standard ID: GB/T 27927-2011 (GB/T27927-2011)
Description (Translated English): Banking and related financial services -- Triple DEA-Modes of operation -- Implementation guidelines
Sector / Industry: National Standard (Recommended)
Classification of Chinese Standard: A11
Classification of International Standard: 35.240.40
Word Count Estimation: 48,499
Date of Issue: 2011-12-30
Date of Implementation: 2012-05-01
Quoted Standard: ISO/IEC 9797-1; ISO/IEC 10116; ISO/IEC 18033-3
Adopted Standard: ISOTR 19038-2005, MOD
Regulation (derived from): Announcement of Newly Approved National Standards No. 23 of 2011
Issuing agency(ies): General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China
Summary: This standard provides for the enhanced data encryption and secure effective implementation of 3-DEA operation mode of technical support and details. The department described 3-DEA operation mode for encryption and decryption operations operations. This standard model is described using the ISO/IEC 18033-3 specified 3-DEA operation block cipher modes of operation (in the ISO/IEC 10116 specified) implementation. 3-DEA operation mode can be used to finance the wholesale business and retail financial services applications. This standard is the interoperability of products and the use of 3-DEA operation mode application provides the basis for the development of standards. This standard will use the DEA SO, and other standard used together.

GB/T 27927-2011: Banking and related financial services -- Triple DEA-Modes of operation -- Implementation guidelines


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Banking and related financial services. Triple DEA-Modes of operation. Implementation guidelines ICS 35.240.40 A11 National Standards of People's Republic of China Banking and related financial services Triple Data Encryption Algorithm Operation mode Implementation Guide (ISO /T R19038.2005, MOD) Issued on. 2011-12-30 2012-05-01 implementation Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China Standardization Administration of China released

Table of Contents

Preface Ⅰ Introduction Ⅱ 1 Scope 1 2 Normative references 1 3 Terms and definitions 4 Symbols and abbreviations 3 5 5 Specification 6 3-DEA operation modes 7 Appendix A (Informative Appendix) 3-DEA operation mode ASN.1 syntax 28 Password Characteristics Appendix B (Informative Appendix) 3-DEA operation mode 33 Aspects of Annex C (informative) key group encryption should be noted that 35 References 43

Foreword

This revised standard adopts ISO /T R19038.2005 "Banking and related financial services - Triple Data Encryption Algorithm operation mode Implementation Guide "(in English). This standard is based on ISO /T R19038.2005 redrafted with ISO /T R19038.2005 technical differences are as follows. a) The standard "TDEA" According to China habits changed to "Triple Data Encryption Algorithm" (referred to as the "3-DEA" herein) (superscript Quasi-body part of the need to distinguish between reservations "triple DEA" argument); b) To facilitate the user's understanding of the standard text, add a term. "error propagation" (see 3.20); c) 5.5 for unnumbered, untitled Table number. Table 1DEA function block execution schedule, the following table No. postponed. d) in 6.6.1.1, the 7.4 TCFB with only difference is fed back to the data block shift function is not Oi Ci " Amended to read "and 6.4 TCFB only difference is fed back to the data block shift function is not Oi Ci" (errata); e) For ease of understanding, B.3.2 title in the "streamcipher" translated as "pseudo-random sequence of vectors {Oi}". For ease of use, this standard also made the following editorial changes. a) the original text of the "technical report" to the "standard"; b) Delete ISO /T R19038.2005 Foreword by modifying the ISO /T R19038. Introduction 2005. This standard Annex A, Annex B, Annex C is informative appendix. The standard proposed by the People's Bank of China. This standard by the National Standardization Technical Committee on Finance (SAC/TC180) centralized. This standard is drafted by. China Financial Computerization Corporation. Participated in the drafting of this standard. People's Bank of China, Industrial and Commercial Bank of China, Bank of China, Bank of Communications, China UnionPay Co., North China Institute of Computing Technology, Beijing Technology and Business University, Taiyuan Central Branch of People's Bank of China. The main drafters of this standard. Wang Ping baby, Lushu Chun, Li Shuguang, Lu Yi, Yang Yingli, Liu Yun, Liu Zhijun, forest, Zhang Qirui, Xian, Zhong Zhihui, Liyan Zhi, Zhouyi Peng, Qian Xiang-long, Li Jinsong, Zhaozhi Lan, Jia Shuhui, King Yun, Ma Xiaoqiong, Zhanglong Long.

Introduction

To strengthen the DEA (Data Encryption Algorithm) strength and prolong its life cycle, it is recommended to use the Triple Data Encryption Algorithm (3-DEA) operation mode. 3-DEA mode of operation greatly enhance the strength of a password-protected, since these algorithms based on DEA, therefore, users and vendors can Faster familiar with them. Since the 3-DEA operation mode can be backward compatible with existing DEA mode of operation, financial institutions can use 3-DEA extended Long DEA safety lifecycle investment protection standard DEA technology. Each operating mode has its advantages and characteristics. Selection of a particular mode of operation, implementation and use depends on the security to financial institutions Seeking, risk acceptance and operational requirements, which are not within the scope of this standard. If participants use the same mode of operation and shared secret secret Key, then the need to use this standard as defined herein 3-DEA operation mode according to the parties to provide the basis for interoperability. This standard does not replace the standard 3-DEA DEA algorithm algorithm and ISO /IEC 18033 as specified. DEA is a 3-DEA operation mode Type foundation. 3-DEA uses advanced computing technology and cryptanalysis techniques, provides greater security. 3-DEA available hardware, Software, or a hybrid implementation. This standard provides implementation guidance ISO /IEC 10116 in the specified operating mode. Financial institutions have a responsibility to establish a comprehensive security process that includes the necessary control measures to ensure that the above process in a secure way real Shi, and respond to audit the implementation process to confirm that the process of compliance with safety procedures. Banking and related financial services Triple Data Encryption Algorithm Operation mode Implementation Guide

1 Scope

This standard provides the user with the enhanced data encryption and secure effective implementation of the technical support 3-DEA operation mode and details data. The mode of operation of the 3-DEA operation described for the encryption and decryption operations. The standard mode is described using ISO /IEC 18033-3 specified in the block cipher mode of operation to achieve (in ISO /IEC 10116 as specified) of 3-DEA operation. 3-DEA operation mode can be used to finance wholesale and retail financial services applications. This standard enables interoperability and products With 3-DEA operation mode of application of standards development provides the foundation. The standard will use DEA and other ISO standards used together.

2 Normative references

The following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein Member. For undated references, the latest edition (including any amendments) applies to this document. Data integrity mechanisms ISO /IEC 9797-1 Information technology - Security techniques used block cipher algorithm cryptographic check function ISO /IEC 10116 Information technology - Security techniques n-bit block cipher mode of operation ISO /IEC 18033-3 Information technology - Security techniques - Encryption algorithms - Part 3. Block operator

3 Terms and Definitions

The following terms and definitions apply to this document. 3.1 Birthday phenomenon birthdayphenomenon There are a relatively small group of n members of at least two people may have a common phenomenon birthday. Example. When n = 23, the probability of more than 1/2. If a person from the m digital alternative to each other may randomly pick one of the subjects in the n p = 1-En ^ 2/2m In the above experiments, the expected number of trials before the same value was found to be approximately (πm/2) 1/2. Which indicates that the use of hybrid key 64-bit block encryption operation, if a person owns 232 plaintext/ciphertext pairs and 232 generated by the random input ciphertext block of text dictionary, It should be considered an unknown cipher text block will be searched from the dictionary (see Ref. [11]). 3.2 Block; grouping block Binary string binarystring Example. divided into a given length of plaintext or ciphertext, each fragment is called a block (packet). Plaintext (ciphertext) from left to right by-block encryption (decryption). In the present Standard, for TCBC, TCBC-I, TOFB and TOFB-I \u200b\u200bmode, plaintext and ciphertext is divided into 64-bit block, but for TCFB and TCFB-P mode, It supports an 8-bit and 64-bit plaintext message and to encrypt and decrypt ciphertext block.
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 27927-2011_English be delivered?

Answer: Upon your order, we will start to translate GB/T 27927-2011_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 7 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 27927-2011_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 27927-2011_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.