ANSI X9.52 : 1998
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
TRIPLE DATA ENCRYPTION ALGORITHM MODES OF OPERATION
23-07-2013
12-01-2013
Foreword
American National Standards Institute
1 Scope
2 Normative References
3 Definitions
4 Symbols and Abbreviations
5 Organization
6 Specifications
6.1 TDEA Encryption/Decryption Operation
6.2 Keying Options
6.3 TDEA Modes of Operation
6.4 Backward Compatibility
6.5 Schedule of DEA Functional Blocks
6.6 Improving Throughout and Minimizing Propagation
6.7 Keys and Initialization Vectors
6.8 Input and Output
7 TDEA Modes of Operation
7.1 TDEA Electronic Codebook Mode of Operation
7.1.1 TECB Definition
7.1.2 TECB Properties
7.2 TDEA Cipher Block Chaining Mode of Operation
7.2.1 TCBC Definition
7.2.2 TCBC Properties
7.3 TDEA Cipher Block Chaining Mode of Operation - Interleaved
7.3.1 TCBC-I Definition
7.3.2 TCBC-I Properties
7.4 TDEA Cipher Feedback Mode of Operation
7.4.1 TCFB Definition
7.4.2 TCFB Properties
7.5 TDEA Cipher Feedback Mode of Operation - Pipelined
7.5.1 TCFB-P Definition
7.5.2 TCFB-P Properties
7.6 TDEA Output Feedback Mode of Operation
7.6.1 TOFB Definition
7.6.2 TOFB Properties
7.7 TDEA Output Feedback Mode of Operation - Interleaved
7.7.1 TOFB-I Definition
7.7.2 TOFB-I Properties
Annex A ASN.1 Syntax for TDEA Modes of Operation (normative)
A.1 Overview
A.2 Syntax for TDEA Modes of Operations
A.3 Object Identifiers
A.4 Supporting Definitions
A.5 ASN.1 Module
Annex B TDEA Modes of Operation Cryptographic Attributes (informative)
B.1 Mode of Operation
B.2 Key Attacks
B.3 Text Attacks
B.3.1 Stream Cipher Cycle Length
B.3.2 Text Dictionary
B.3.3 Matching Ciphertext
B.4 Guidance on the Authentication of Data
Annex C Examples of TDEA Modes of Operation (informative)
C.1 TDEA Electronic Codebook Mode (TECB)
C.1.1 TECB Encryption
C.1.2 TECB Decryption
C.2 TDEA Cipher Block Chaining Mode (TCBC)
C.2.1 TCBC Encryption
C.2.2 TCBC Decryption
C.3 TDEA Cipher Block Chaining Mode - Interleaved (TCBC-I)
C.3.1 TCBC-I Encryption
C.3.2 TCBC-I Decryption
C.4 TDEA Cipher Feedback Mode (TCFB)
C.4.1 TCFB1
C.4.2 TCFB8
C.4.3 TCFB64
C.5 TDEA Cipher Feedback Mode - Pipelined (TCFB-P)
C.5.1 TCFB1-P
C.5.2 TCFB8-P
C.5.3 TCFB64-P
C.6 TDEA Output Feedback Mode (TOFB)
C.6.1 TOFB Encryption
C.6.2 TOFB Decryption
C.7 TDEA Output Feedback Mode - Interleaved (TOFB-I)
C.7.1 TOFB-I Encryption
C.7.2 TOFB-I Decryption
Specifies the Triple Data Encryption Algorithm (TDEA) modes of operation for the enhanced cryptographic protection of digital data. Modes of operation are specified for both deciphering and enciphering operations, and are based on three-fold compound operations of encryption and decryption using ANSI X3.92 Data Encryption Algorithm (DEA). TDEA may be implemented in hardware, software, or a combination of both. The TDEA modes of operation may be used in both wholesale and retail financial applications. For use with other ANSI X9 standards using DEA.
Committee |
X9
|
DocumentType |
Standard
|
PublisherName |
American Bankers Association
|
Status |
Withdrawn
|
ISO/IEC 24824-3:2008 | Information technology Generic applications of ASN.1: Fast infoset security Part 3: |
ANSI X9.98 : 2010(R2017) | FINANCIAL SERVICES - LATTICE-BASED POLYNOMIAL PUBLIC KEY ESTABLISHMENT ALGORITHM FOR THE FINANCIAL SERVICES INDUSTRY |
BS IEC 62055-41:2014 | Electricity metering. Payment systems Standard transfer specification (STS). Application layer protocol for one-way token carrier systems |
12/30268705 DC : 0 | BS EN 15509 - ELECTRONIC FEE COLLECTION - INTEROPERABILITY APPLICATION PROFILE FOR DSRC |
IEEE 1076-2008 REDLINE | IEEE Standard VHDL Language Reference Manual |
INCITS/ISO/IEC 18033-3 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 3: BLOCK CIPHERS |
IEEE 1363.3-2013 | IEEE Standard for Identity-Based Cryptographic Techniques using Pairings |
BS IEC 61691-1-1:2011 | Behavioural languages VHDL Language reference manual |
ANSI X9.44:2007 | FINANCIAL SERVICES - PUBLIC-KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - KEY ESTABLISHMENT USING INTEGER FACTORIZATION CRYPTOGRAPHY |
ASTM E 2085 : 2000 : REV A | Standard Guide on Security Framework for Healthcare Information (Withdrawn 2009) |
CEN/TS 15130:2006 | Postal services - DPM infrastructure - Messages supporting DPM applications |
DD CEN/TS 15130:2006 | Postal services. DPM infrastructure. Messages supporting DPM applications |
16/30335156 DC : 0 | BS EN 14615 - POSTAL SERVICES - DIGITAL POSTAGE MARKS - APPLICATIONS, SECURITY AND DESIGN |
BS ISO/IEC 18033-3:2010 | Information technology. Security techniques. Encryption algorithms Block ciphers |
13/30284056 DC : 0 | BS EN 62055-41 - ELECTRICITY METERING - PAYMENT SYSTEMS - PART 41: STANDARD TRANSFER SPECIFICATION (STS) - APPLICATION LAYER PROTOCOL FOR ONE-WAY TOKEN CARRIER SYSTEMS |
03/103592 DC : DRAFT MAR 2003 | BS EN 14615 - POSTAL SERVICES - AUTOMATED PROCESSING OF MAIL ITEMS - DIGITAL POSTAGE MARKS |
DD ISO/TS 25237:2008 | Health informatics. Pseudonymization |
ANSI X9 TR 39 : 2009 | TG-3 RETAIL FINANCIAL SERVICES COMPLIANCE GUIDELINE - PART 1: PIN SECURITY AND KEY MANAGEMENT |
ANSI X9.92-1 : 2009 | PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - DIGITAL SIGNATURE ALGORITHMS GIVING PARTIAL MESSAGE RECOVERY - PART 1: ELLIPTIC CURVE PINTSOV-VANSTONE SIGNATURES (ECPVS) |
IEC 62055-41:2014 RLV | Electricity metering – Payment systems – Part 41: Standard transfer specification (STS) – Application layer protocol for one-way token carrier systems |
IEC 62530:2011 | SystemVerilog - Unified Hardware Design, Specification, and Verification Language |
NEMA PS3.3 : 2017A | DIGITAL IMAGING AND COMMUNICATIONS IN MEDICINE (DICOM) - PART 3: INFORMATION OBJECT DEFINITIONS |
NEMA PS 3.15 : 2017A | DIGITAL IMAGING AND COMMUNICATIONS IN MEDICINE (DICOM) - PART 15: SECURITY AND SYSTEM MANAGEMENT PROFILES |
IEEE 1800-2012 | IEEE Standard for SystemVerilog--Unified Hardware Design, Specification, and Verification Language |
15/30285708 DC : 0 | BS EN ISO 25237 - HEALTH INFORMATICS - PSEUDONYMISATION |
TR 170 002 : 3.1.1 | PROJECT MESA; SERVICE SPECIFICATION GROUP - SERVICES AND APPLICATIONS; DEFINITIONS, SYMBOLS AND ABBREVIATIONS |
04/30040721 DC : DRAFT JUL 2004 | ISO/IEC 18033-3 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 3: BLOCK CIPHERS |
BS EN 14615:2017 | Postal services. Digital postage marks. Applications, security and design |
ANSI X9.112-1 : 2009 | WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
I.S. EN ISO 25237:2017 | HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017) |
I.S. EN 14615:2017 | POSTAL SERVICES - DIGITAL POSTAGE MARKS - APPLICATIONS, SECURITY AND DESIGN |
ANSI X9.110 : 2008(R2013) | FINANCIAL SERVICES - TOLEC - TRANSFER OF LOCATION OF ELECTRONIC CONTRACTS |
ANSI X9.112 : 2016 | WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
ISO/TR 19038:2005 | Banking and related financial services Triple DEA Modes of operation Implementation guidelines |
ISO/TR 13569:2005 | Financial services Information security guidelines |
EN 16312:2013 | Intelligent transport systems - Automatic Vehicle and Equipment Registration (AVI/AEI) - Interoperable application profile for AVI/AEI and Electronic Register Identification using dedicated short range communication |
I.S. EN 16312:2013 | INTELLIGENT TRANSPORT SYSTEMS - AUTOMATIC VEHICLE AND EQUIPMENT REGISTRATION (AVI/AEI) - INTEROPERABLE APPLICATION PROFILE FOR AVI/AEI AND ELECTRONIC REGISTER IDENTIFICATION USING DEDICATED SHORT RANGE COMMUNICATION |
ANSI X9.65 : 2004 | TRIPLE DATA ENCRYPTION ALGORITHM (TDEA), IMPLEMENTATION STANDARD |
BS EN 16312:2013 | Intelligent transport systems. Automatic Vehicle and Equipment Registration (AVI/AEI). Interoperable application profile for AVI/AEI and Electronic Register Identification using dedicated short range communication |
ANSI X9/TG-19-1 : 1999 | MODES OF OPERATION VALIDATION SYSTEM FOR THE TRIPLE DATA ENCRYPTION ALGORITHM (TMOVS): REQUIREMENTS AND PROCEDURES |
PREN 15509 : DRAFT 2012 | ELECTRONIC FEE COLLECTION - INTEROPERABILITY APPLICATION PROFILE FOR DSRC |
I.S. CEN TS 15130:2006 | POSTAL SERVICES - DPM INFRASTRUCTURE - MESSAGES SUPPORTING DPM APPLICATIONS |
IEEE 1364-2005 | IEEE Standard for Verilog Hardware Description Language |
GS QKD 008 : 1.1.1 | QUANTUM KEY DISTRIBUTION (QKD); QKD MODULE SECURITY SPECIFICATION |
ISO/TS 25237:2008 | Health informatics Pseudonymization |
ANSI X9/TG-3 : 2006 | RETAIL FINANCIAL SERVICES COMPLIANCE GUIDELINE - ONLINE PIN SECURITY AND KEY MANAGEMENT |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
I.S. CWA 14722-4:2004 | EMBEDDED FINANCIAL TRANSACTIONAL IC CARD READER (EMBEDDED FINREAD) - PART 4: TECHNICAL ARCHITECTURE AND DEFINITION OF APIS (APPLICATION PROGRAMMING INTERFACE) |
ISO 25237:2017 | Health informatics — Pseudonymization |
EN ISO 25237:2017 | Health informatics - Pseudonymization (ISO 25237:2017) |
EN 14615:2017 | Postal services - Digital postage marks - Applications, security and design |
PD ISO/TR 13569:2005 | Financial services. Information security guidelines |
IEC 61691-1-1:2011 | Behavioural languages - Part 1-1: VHDL Language Reference Manual |
BS IEC 62530:2011 | SystemVerilog. Unified hardware design, specification, and verification language |
BS EN ISO 25237:2017 | Health informatics. Pseudonymization |
I.S. CWA 14722-3:2004 | EMBEDDED FINANCIAL TRANSACTIONAL IC CARD READER (EMBEDDED FINREAD) - PART 3: FUNCTIONAL AND SECURITY SPECIFICATIONS |
ANSI X9.42 : 2003(R2013) | PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES: AGREEMENT OF SYMMETRIC KEYS USING DISCRETE LOGARITHM CRYPTOGRAPHY |
SCTE 201 : 2013 | OPEN MEDIA SECURITY (OMS) ROOT KEY DERIVATION PROFILES AND TEST VECTORS |
IEC 62055-41:2018 RLV | Electricity metering - Payment systems - Part 41: Standard transfer specification (STS) - Application layer protocol for one-way token carrier systems |
ANSI X9 TR 31 : 2010 | INTEROPERABLE SECURE KEY EXCHANGE KEY BLOCK SPECIFICATION FOR SYMMETRIC ALGORITHMS |
DIN EN ISO 25237:2015-10 (Draft) | HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017) |
UNI EN 16312 : 2013 | INTELLIGENT TRANSPORT SYSTEMS - AUTOMATIC VEHICLE AND EQUIPMENT REGISTRATION (AVI/AEI) - INTEROPERABLE APPLICATION PROFILE FOR AVI/AEI AND ELECTRONIC REGISTER IDENTIFICATION USING DEDICATED SHORT RANGE COMMUNICATION |
I.S. CWA 14174-3:2004 | FINANCIAL TRANSACTIONAL IC CARD READER (FINREAD) - PART 3: SECURITY REQUIREMENTS |
ANSI X9.84 : 2010(R2017) | BIOMETRIC INFORMATION MANAGEMENT AND SECURITY FOR THE FINANCIAL SERVICES INDUSTRY |
ANSI X9.82-3 : 2007(R2017) | RANDOM NUMBER GENERATION - PART 3: DETERMINISTIC RANDOM BIT GENERATORS |
CSA ISO/IEC 18033-3:2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 3: BLOCK CIPHERS |
ANSI X9.82-1 : 2006(R2013) | RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES |
CAN/CSA-ISO/IEC 18033-3:12 (R2016) | Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers (Adopted ISO/IEC 18033-3:2010, second edition, 2010-12-15) |
ISO 8372:1987 | Information processing Modes of operation for a 64-bit block cipher algorithm |
ANSI INCITS 92 : 1981 | DATA ENCRYPTION ALGORITHM |
ANSI INCITS 106 : 1983 | INFORMATION SYSTEMS - DATA ENCRYPTION ALGORITHM - MODES OF OPERATION |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.