Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

ANSI X9.63 : 2011

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY

Superseded date

30-04-2024

Superseded by

ANSI X9.63:2011(R2017)

Published date

01-01-2017

Sorry this product is not available in your region.

X9 MEMBER ORGANIZATION REPRESENTATIVE
X9F MEMBER ORGANIZATION REPRESENTATIVE
X9F1 MEMBER ORGANIZATION REPRESENTATIVE
1 SCOPE
2 DEFINITIONS, ABBREVIATIONS AND REFERENCES
3 APPLICATION
4 MATHEMATICAL CONVENTIONS
5 CRYPTOGRAPHIC INGREDIENTS
6 KEY AGREEMENT SCHEMES
7 KEY TRANSPORT SCHEMES
ANNEX A (NORMATIVE) - NORMATIVE NUMBER-THEORETIC
        ALGORITHMS
ANNEX B (INFORMATIVE) - MATHEMATICAL BACKGROUND
ANNEX C (INFORMATIVE) - TABLES OF TRINOMIALS,
        PENTANOMIALS, AND GAUSSIAN NORMAL BASES
ANNEX D (INFORMATIVE) - INFORMATIVE NUMBER-THEORETIC
        ALGORITHMS
ANNEX E (INFORMATIVE) - COMPLEX MULTIPLICATION
        (CM) ELLIPTIC CURVE GENERATION METHOD
ANNEX F (INFORMATIVE) - SECURITY CONSIDERATIONS
ANNEX G (INFORMATIVE) - EXAMPLES
ANNEX H (INFORMATIVE) - ASN.1
ANNEX I (NORMATIVE) - LEGACY SCHEMES
ANNEX J (INFORMATIVE) - BIBLIOGRAPHY

Describes key establishment schemes that employ asymmetric cryptographic techniques.

Committee
X9
DocumentType
Standard
PublisherName
American Bankers Association
Status
Superseded
SupersededBy

ISO/IEC/IEEE 8802-22:2015 Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands
ANSI X9.98 : 2010(R2017) FINANCIAL SERVICES - LATTICE-BASED POLYNOMIAL PUBLIC KEY ESTABLISHMENT ALGORITHM FOR THE FINANCIAL SERVICES INDUSTRY
ANSI X9.80 : 2005(R2013) PRIME NUMBER GENERATION, PRIMALITY TESTING, AND PRIMALITY CERTIFICATES
07/30135624 DC : 0 BS ISO/IEC 15946-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 1: GENERAL
BS ISO/IEC 9796-3:2006 Information technology. Security techniques. Digital signature schemes giving message recovery Discrete logarithm based mechanisms
ANSI INCITS 467 : 2011 INFORMATION TECHNOLOGY - SCSI STREAM COMMANDS - 3 (SSC-3)
ANSI X9.96 : 2004 FINANCIAL SERVICES - XML CRYPTOGRAPHIC MESSAGE SYNTAX (XCMS)
INCITS/ISO/IEC 15946-2 : 2002 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 2: DIGITAL SIGNATURES
PD CEN/TS 15480-2:2012 Identification card systems. European Citizen Card Logical data structures and security services
BS ISO/IEC 15946-3:2002 Information technology. Security techniques. Cryptographic techniques based on elliptic curves Key establishment
INCITS/ISO/IEC 15946-3 : 2002 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT
IEEE 1363.3-2013 IEEE Standard for Identity-Based Cryptographic Techniques using Pairings
CSA ISO/IEC 15946-2 : 2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 2: DIGITAL SIGNATURES
I.S. EN 62734:2015 INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A
S.R. CEN/TS 15480-2:2012 IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 2: LOGICAL DATA STRUCTURES AND SECURITY SERVICES
UNI CEN/TS 15480-2 : 2012 IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 2: LOGICAL DATA STRUCTURES AND SECURITY SERVICES
ANSI X9.44:2007 FINANCIAL SERVICES - PUBLIC-KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - KEY ESTABLISHMENT USING INTEGER FACTORIZATION CRYPTOGRAPHY
EN 62734:2015 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
CEN/TS 15480-2:2012 Identification card systems - European Citizen Card - Part 2: Logical data structures and security services
12/30259506 DC : DRAFT JAN 2012 BS EN 62734 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS (BASED ON ISA 100.11A)
ANSI INCITS 516 : 2013(R2018) INFORMATION TECHNOLOGY - SCSI STREAM COMMANDS - 4 (SSC-4)
02/652466 DC : DRAFT MAY 2002 ISO/IEC FCD 15946-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 4: DIGITAL SIGNATURES GIVING MESSAGE RECOVERY
15/30318285 DC : 0 BS ISO/IEC 15946-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 1: GENERAL
ANSI X9 TR 39 : 2009 TG-3 RETAIL FINANCIAL SERVICES COMPLIANCE GUIDELINE - PART 1: PIN SECURITY AND KEY MANAGEMENT
DD CEN/TS 15480-2:2007 Identification card systems. European Citizen Card Logical data structures and card services
BS ISO/IEC 15946-1:2016 Information technology. Security techniques. Cryptographic techniques based on elliptic curves General
ANSI X9.92-1 : 2009 PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - DIGITAL SIGNATURE ALGORITHMS GIVING PARTIAL MESSAGE RECOVERY - PART 1: ELLIPTIC CURVE PINTSOV-VANSTONE SIGNATURES (ECPVS)
S.R. CEN/TS 15480-3:2014 IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 3: EUROPEAN CITIZEN CARD INTEROPERABILITY USING AN APPLICATION INTERFACE
ARINC 823-1 : 2007 DATALINK SECURITY - PART 1: ACARS MESSAGE SECURITY
ISO/IEC 15946-4:2004 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 4: Digital signatures giving message recovery
CSA ISO/IEC 15946-3 : 2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT
BS ISO/IEC/IEEE 8802-22:2015 Information technology. Telecommunications and information exchange between systems. Local and metropolitan area networks. Specific requirements Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands
PD CEN/TS 15480-3:2014 Identification card systems. European Citizen Card European Citizen Card Interoperability using an application interface
BS ISO/IEC 15946-4:2004 Information technology. Security techniques. Cryptographic techniques based on elliptic curves Digital signatures giving message recovery
10/30218910 DC : 0 BS ISO/IEC IEEE 8802-15-4 - INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - LOCAL AND METROPOLITAN AREA NETWORKS - SPECIFIC REQUIREMENTS - PART 15-4: WIRELESS MEDIUM ACCESS CONTROL (MAC) AND PHYSICAL LAYER (PHY) SPECIFICATIONS FOR LOW-RATE WIRELESS PERSONAL AREA NETWORKS (WPANS)
07/30161079 DC : 0 BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
INCITS/ISO/IEC 15946-1 : 2002 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 1: GENERAL
BS ISO/IEC 11770-3 : 2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
IEC 62734:2014 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
ANSI X9.65 : 2004 TRIPLE DATA ENCRYPTION ALGORITHM (TDEA), IMPLEMENTATION STANDARD
04/30117200 DC : DRAFT DEC 2004 ISO/IEC 9796-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 3: DISCRETE LOGARITHM BASED MECHANISMS
CSA ISO/IEC 15946-4 : 2005 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 4: DIGITAL SIGNATURES GIVING MESSAGE RECOVERY
CAN/CSA-ISO/IEC 11770-3:16 Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques (Adopted ISO/IEC 11770-3:2015, third edition, 2015-08-01)
BS EN 62734:2015 Industrial networks. Wireless communication network and communication profiles. ISA 100.11a
ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
07/30161082 DC : 0 BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES
ANSI X9/TG-3 : 2006 RETAIL FINANCIAL SERVICES COMPLIANCE GUIDELINE - ONLINE PIN SECURITY AND KEY MANAGEMENT
ISO/IEC 14776-333:2013 Information technology Small Computer System Interface (SCSI) Part 333: SCSI Stream Commands - 3 (SSC-3)
IEC PAS 62734:2012 Industrial communication networks - Fieldbus specifications - Wireless systems for industrial automation: process control and related applications
PD IEC/PAS 62734:2012 Industrial communication networks. Fieldbus specifications. Wireless systems for industrial automation: process control and related applications
UNI CEN/TS 15480-3 : 2014 IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 3: EUROPEAN CITIZEN CARD INTEROPERABILITY USING AN APPLICATION INTERFACE
TR 103 200 : 1.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS); EPASSPORT READERS INTEROPERABILITY SUPPORT; FRAMEWORK FOR DEVELOPING CONFORMANCE TEST SPECIFICATIONS
IEEE 802.15.4-2011 IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)
13/30257954 DC : 0 BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
DD CEN/TS 15480-3:2010 Identification card systems. European citizen card European citizen card interoperability using an application interface
BS ISO/IEC 15946-2:2002 Information technology. Security techniques. Cryptographic techniques based on elliptic curves Digital signatures
07/30161232 DC : 0 BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
CAN/CSA-ISO/IEC/IEEE 8802-22:16 Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 22: Cognitive Wireless RAN Medium Access Control (MCA) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands (Adopted ISO/IEC/IEEE 8802-22:2015, first edition, 2015-05-01)
IEEE 802.22-2011 IEEE Standard for Information technology-- Local and metropolitan area networks-- Specific requirements-- Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Policies and procedures for operation in the TV Bands
ISO/IEC/IEEE 8802-15-4:2018 Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 15-4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (WPANs)
ISO/IEC 15946-2:2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 2: Digital signatures
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
ISO/IEC 15946-3:2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 3: Key establishment
CEN/TS 15480-3:2014 Identification card systems - European Citizen Card - Part 3: European Citizen Card Interoperability using an application interface
ANSI X9.84 : 2010(R2017) BIOMETRIC INFORMATION MANAGEMENT AND SECURITY FOR THE FINANCIAL SERVICES INDUSTRY
ANSI X9.82-3 : 2007(R2017) RANDOM NUMBER GENERATION - PART 3: DETERMINISTIC RANDOM BIT GENERATORS
ANSI X9.79-4 : 2013 PUBLIC KEY INFRASTRUCTURE (PKI) - PART 4: ASYMMETRIC KEY MANAGEMENT
ANSI X9.82-1 : 2006(R2013) RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES
CAN/CSA-ISO/IEC 15946-1:18 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General (Adopted ISO/IEC 15946-1:2016, third edition, 2016-07-01)

ISO/IEC 8825-2:2015 Information technology ASN.1 encoding rules: Specification of Packed Encoding Rules (PER) Part 2:
ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
ISO/IEC 8824-2:2015 Information technology Abstract Syntax Notation One (ASN.1): Information object specification Part 2:
ISO/IEC 8824-4:2015 Information technology Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications Part 4:
ISO/IEC 8824-1:2015 Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Part 1:
ISO/IEC 8824-3:2015 Information technology Abstract Syntax Notation One (ASN.1): Constraint specification Part 3:

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more