GB/T 27909.3-2011
Banking.Key management(retail).Part 3:Asymmetric cryptosystems.Key management and life cycle (English Version)

Standard No.
GB/T 27909.3-2011
Language
Chinese, Available in English version
Release Date
2011
Published By
General Administration of Quality Supervision, Inspection and Quarantine of the People‘s Republic of China
Latest
GB/T 27909.3-2011
Scope
This section specifies the protection techniques for symmetric and asymmetric keys when using asymmetric cryptographic mechanisms in a retail financial services environment. It also describes the lifecycle management associated with asymmetric keys. This section applies to technical compliance with the principles described in GB/T 27909.1. The retail financial services environment of this standard is limited to the interfaces between the following entities: — card acceptance equipment and acquirer; — acquirer and card issuer; — integrated circuit card (ICC) and card acceptance equipment.

GB/T 27909.3-2011 Referenced Document

  • ANSI X9.42-2003 Public Key Cryptography for the Financial Services: Agreement of Symmetric Keys Using Discrete Logarithm Cryptography
  • GB/T 17964-2000 Information technology -Security techniques-Modes of operation for an n-bit block cipher
  • GB/T 20547.2 Banking Secure Cryptographic devices (retail) Part 2: Security compliance checklists for devices used in financial transaction
  • GB/T 21078.1 Financial Services Personal Identification Number Management and Security Part 1: PIN Basic Principles and Requirements for Card-Based Systems*2023-03-17 Update
  • GB/T 21079.1 Financial services—Secure cryptographic devices(retail)—Part 1:Concepts, requirements and evaluation methods*2022-12-30 Update
  • GB/T 27909.1 Banking.Key management (retail).Part 1:Principles
  • GB/T 27909.2 Banking.Key management(retail).Part 2:Symmetric ciphers.Key management and life cycle
  • ISO 15782-1:2003 Certificate management for financial services - Part 1: Public key certificates
  • ISO 16609:2004 Banking - Requirements for message authentication using symmetric techniques
  • ISO/IEC 10118 Corrigendum 1 - Information technology - Security techniques - Hash-functions - Part 4: Hash-functions using modular arithmetic
  • ISO/IEC 11770-3 Information security — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: TFNS identity-based key agreement
  • ISO/IEC 14888-3 IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms*2018-11-12 Update
  • ISO/IEC 15946-3:2002 Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 3: Key establishment*2024-04-19 Update
  • ISO/IEC 18033-2 Amendment 1 - Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers - FACE*2017-11-06 Update
  • ISO/IEC 9796-2:2002 Information technology - Security techniques, Digital signature schemes giving message recovery - Part 2: Integer factorization based mechanisms

GB/T 27909.3-2011 history

  • 2011 GB/T 27909.3-2011 Banking.Key management(retail).Part 3:Asymmetric cryptosystems.Key management and life cycle
Banking.Key management(retail).Part 3:Asymmetric cryptosystems.Key management and life cycle

GB/T 27909.3-2011 -All Parts




Copyright ©2024 All Rights Reserved