X9.124 Symmetric Key Cryptography for the Financial Services Industry Format Preserving Encryption is a suite of standards consisting of five parts. Part 1 of this standard includes a set of definitions common to all FPE techniques, a security model for FPE block cipher techniques, and a description of the pseudocode language used in defining the mode specified in this document. Part 2 defines requirements for Format Preserving Encryption - Counter Mode (FPCM). FPCM methods encrypt data strings of a specific length and character set into ciphertext of the same length using the same character set and using the equivalent of Counter Mode (CTR) defined in NIST SP38B. Format Preserving Encryption is useful in situations where fixed-format data, such as Primary Account Numbers (PANs) or Social Security Numbers, must be encrypted, but there is a requirement to limit changes to existing communication protocols, database schemata or application code. FPCM is a particularly simple and efficient mechanism to achieve format preserving encryption, which shares many of the strengths and challenges of CTR.
Data security breaches continue to put millions of consumers at risk. Protecting consumer information is a shared responsibility for all parties involved including legacy and cloud service providers, organizations that store, transmit, or process consumer information, financial institutions, and individual consumers. Provides requirements, recommendations, and information regarding consumer information, business data, general data protection, and breach notification. (Package contains ANSI X9.141-1-2021 and ANSI X9-141-2-2021)
This standard provides basic principles and techniques, which outline the minimum-security measures required for effective international PIN management. PIN protection techniques applicable to financial transaction card originated transactions in an online environment and a standard means of interchanging PIN data.
定价: 910元 / 折扣价: 774 元 加购物车
The Standard consists of four parts: Part 1: Overview and Basic Principles; Part 2: Entropy Sources; Part 3: Deterministic Random Bit Generator Mechanisms; Part 4: Random Bit Generator Construction.Part 3 includes: A model for a deterministic random bit generator (DRBG), Requirements for DRBG mechanisms, Specifications for DRBG mechanisms that are based on hash functions or block ciphers, or are based on number theoretic problems, Implementation issues, and Assurance considerations.
定价: 546元 / 折扣价: 465 元 加购物车
This standard establishes paper specifications for the MICR documents that are used in the US Payments System. While checks, substitute checks (IRDs) and deposit tickets are the primary documents considered in these specifications, users of MICR/OCR E-13B font readers will be well served by applying these specifications to internal documents, when intended for use in reader/sorters. This standard gives specifications to those attributes most important and most common both to raw base stock and to finished printed products of MICR documents. When available, methodology for measurements of the various paper attributes shall conform to those of the Technical Association of Pulp and Paper Industry (TAPPI). The specifications state what are considered to be the appropriate requirements for paper documents intended for external processing from the viewpoint of the end user, namely the institution performing post encoding in proof-of-deposit applications and those that operate reader/sorter equipment for in-clearing and transit clearing applications. Nonetheless, these same specifications are also considered appropriate requirements for paper before any print process is applied to base stock. Base stock, either from rolls or from sheets, must meet the specifications as well as fully processed, end user documents. Paper specifications from the standpoint of fraud prevention and security are not given within this standard. The various features that paper can have that hinder fraud and aid authentication of original document are addressed in ANSI X9.100-170 Check Fraud Deterrent Icon standard and in X9/TR 8 Check Security. Although reference may be made within this standard to various commonly used paper-based security features, setting specifications for paper-based security features are excluded from the scope of this standard. There are additional paper characteristics important to document printers and end users in terms of printability and mechanical performance in their individual operations that are related to document performance. Paper characteristics such as moisture content, filler content, brightness, pH, coefficient of friction, ink absorption, etc., are quite variable within the industry and are not covered in this standard because many of them are not measurable by the end user due to exposure to other conditions during the manufacturing processes.
Defines specific TIFF fields and parameters for check image exchange and the allowable values for those parameters. This standard will only address the use of G4 bilevel image (black/white) compressions within the TIFF 6.0 structure. A least common denominator approach was used to identify the fields that everyone should read and the required or allowable values for these fields that everyone will be expected to support. To accomplish interoperability, some of the fields and values are more restrictive compared to what is being generated in todays environment. In addition, this standard clarified areas that have been interpreted in different ways.
Part 1 of this standard specifies the shape, dimensions, magnetic signal level, and tolerances for the E-13B characters which include ten numerals and four special symbols printed in magnetic ink and used for the purpose of character recognition. It describes the various known types of printing defects and other printing considerations, together with the tolerances permitted. Part 2 provides informative conformance testing requirements for the Part 1 specifications. Part 3 specifies the requirements for secondary reference documents and the test equipment for calibrating and maintaining their signal level.
Wireless technologies have rapidly emerged as significant components of networks. The ease and speed of deployment, as well as inexpensive transmission rates, makes them ideal for deploying new systems. Whereas installations used to be delayed several months because of complicated landline connections, a wireless deployment can happen the same day an ATM or POS terminal is ordered. Greater wireless coverage, greater reliability, higher transfer speeds, and improved equipment quality has only increased the likelihood that ATMs with wireless are a preferred option. Data classification and risk assessments still need to be performed, however, to determine asset value and the risks introduced by transmission over wireless networks. The question is still how data is being secured. Numerous control methods must be used to protect sensitive data on wireless networks such as encrypting communication prior to transmission and decrypting it afterwards.
This part of ANS X9.24 establishes requirements and guidelines for the secure management and application-level interoperability of such automated keying operations. This part of this standard addresses symmetric keys managed with asymmetric keys, and asymmetric keys managed with symmetric keys (as in the storage of private keys encrypted with a symmetric master key for storage as cryptograms on a local database)