Since the enactment of Check 21, there has been unprecedented adoption of image exchange. This standard establishes the basis for U.S. check image exchange between financial institutions; all financial values in this standard are assumed to represent U.S. Dollars. This standard establishes requirements and limitations that are compatible with current industry practice. It maintains flexibility in order to accommodate the needs of different institutions and exchange networks. Users of this standard should be aware that most financial exchanges utilize a 鬰ompanion document?that defines the specific requirements and implementation rules for exchange within a particular network or institution agreement. The companion document should reference the specific edition of this standard that applies with the specific version of the companion document in use. Generally, US check exchange utilizes the Universal Companion Document (UCD) that can be referenced at the CheckImage Collaborative website, CheckImage Central at www.checkimagecentral.org. This standard, including the normative annexes, establishes the file sequences, record types, and field formats to be used for the electronic exchange of check MICR line, associated check processing data and check images in the form of cash letters. This standard does not address operational, implementation, or settlement needs. These requirements may include, but are not limited to, a choice of: data and image compression, encryption, and transmission specifications and data representation. The informative annexes attached to this standard provide information that may prove useful to those planning to implement the standard.
Defines a method for digital signature generation and verification for the protection of messages and data using the Digital Signature Algorithm (DSA). This standard is used in conjunction with the hash function, as defined in American National Standard for Public Key Cryptography - Part 2: The Secure Hash Algorithm (SHA-1), BSR X9.30.2. In addition, this standard provides the criteria for the generation of public and private keys that are required by the algorithm and the procedural controls required for the secure use of the algorithm. Specific sections include definitions and common abbreviations, application, the DSA, Generation of Primes for the DSA, Random Number Generation for the DSA.