ANSI X9.63 : 2011
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY
04-30-2024
01-01-2017
X9 MEMBER ORGANIZATION REPRESENTATIVE
X9F MEMBER ORGANIZATION REPRESENTATIVE
X9F1 MEMBER ORGANIZATION REPRESENTATIVE
1 SCOPE
2 DEFINITIONS, ABBREVIATIONS AND REFERENCES
3 APPLICATION
4 MATHEMATICAL CONVENTIONS
5 CRYPTOGRAPHIC INGREDIENTS
6 KEY AGREEMENT SCHEMES
7 KEY TRANSPORT SCHEMES
ANNEX A (NORMATIVE) - NORMATIVE NUMBER-THEORETIC
ALGORITHMS
ANNEX B (INFORMATIVE) - MATHEMATICAL BACKGROUND
ANNEX C (INFORMATIVE) - TABLES OF TRINOMIALS,
PENTANOMIALS, AND GAUSSIAN NORMAL BASES
ANNEX D (INFORMATIVE) - INFORMATIVE NUMBER-THEORETIC
ALGORITHMS
ANNEX E (INFORMATIVE) - COMPLEX MULTIPLICATION
(CM) ELLIPTIC CURVE GENERATION METHOD
ANNEX F (INFORMATIVE) - SECURITY CONSIDERATIONS
ANNEX G (INFORMATIVE) - EXAMPLES
ANNEX H (INFORMATIVE) - ASN.1
ANNEX I (NORMATIVE) - LEGACY SCHEMES
ANNEX J (INFORMATIVE) - BIBLIOGRAPHY
Describes key establishment schemes that employ asymmetric cryptographic techniques.
Committee |
X9
|
DocumentType |
Standard
|
PublisherName |
American Bankers Association
|
Status |
Superseded
|
SupersededBy |
ISO/IEC/IEEE 8802-22:2015 | Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands |
ANSI X9.98 : 2010(R2017) | FINANCIAL SERVICES - LATTICE-BASED POLYNOMIAL PUBLIC KEY ESTABLISHMENT ALGORITHM FOR THE FINANCIAL SERVICES INDUSTRY |
ANSI X9.80 : 2005(R2013) | PRIME NUMBER GENERATION, PRIMALITY TESTING, AND PRIMALITY CERTIFICATES |
07/30135624 DC : 0 | BS ISO/IEC 15946-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 1: GENERAL |
BS ISO/IEC 9796-3:2006 | Information technology. Security techniques. Digital signature schemes giving message recovery Discrete logarithm based mechanisms |
ANSI INCITS 467 : 2011 | INFORMATION TECHNOLOGY - SCSI STREAM COMMANDS - 3 (SSC-3) |
ANSI X9.96 : 2004 | FINANCIAL SERVICES - XML CRYPTOGRAPHIC MESSAGE SYNTAX (XCMS) |
INCITS/ISO/IEC 15946-2 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 2: DIGITAL SIGNATURES |
PD CEN/TS 15480-2:2012 | Identification card systems. European Citizen Card Logical data structures and security services |
BS ISO/IEC 15946-3:2002 | Information technology. Security techniques. Cryptographic techniques based on elliptic curves Key establishment |
INCITS/ISO/IEC 15946-3 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
IEEE 1363.3-2013 | IEEE Standard for Identity-Based Cryptographic Techniques using Pairings |
CSA ISO/IEC 15946-2 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 2: DIGITAL SIGNATURES |
I.S. EN 62734:2015 | INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
S.R. CEN/TS 15480-2:2012 | IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 2: LOGICAL DATA STRUCTURES AND SECURITY SERVICES |
UNI CEN/TS 15480-2 : 2012 | IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 2: LOGICAL DATA STRUCTURES AND SECURITY SERVICES |
ANSI X9.44:2007 | FINANCIAL SERVICES - PUBLIC-KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - KEY ESTABLISHMENT USING INTEGER FACTORIZATION CRYPTOGRAPHY |
EN 62734:2015 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
CEN/TS 15480-2:2012 | Identification card systems - European Citizen Card - Part 2: Logical data structures and security services |
12/30259506 DC : DRAFT JAN 2012 | BS EN 62734 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS (BASED ON ISA 100.11A) |
ANSI INCITS 516 : 2013(R2018) | INFORMATION TECHNOLOGY - SCSI STREAM COMMANDS - 4 (SSC-4) |
02/652466 DC : DRAFT MAY 2002 | ISO/IEC FCD 15946-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 4: DIGITAL SIGNATURES GIVING MESSAGE RECOVERY |
15/30318285 DC : 0 | BS ISO/IEC 15946-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 1: GENERAL |
ANSI X9 TR 39 : 2009 | TG-3 RETAIL FINANCIAL SERVICES COMPLIANCE GUIDELINE - PART 1: PIN SECURITY AND KEY MANAGEMENT |
DD CEN/TS 15480-2:2007 | Identification card systems. European Citizen Card Logical data structures and card services |
BS ISO/IEC 15946-1:2016 | Information technology. Security techniques. Cryptographic techniques based on elliptic curves General |
ANSI X9.92-1 : 2009 | PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - DIGITAL SIGNATURE ALGORITHMS GIVING PARTIAL MESSAGE RECOVERY - PART 1: ELLIPTIC CURVE PINTSOV-VANSTONE SIGNATURES (ECPVS) |
S.R. CEN/TS 15480-3:2014 | IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 3: EUROPEAN CITIZEN CARD INTEROPERABILITY USING AN APPLICATION INTERFACE |
ARINC 823-1 : 2007 | DATALINK SECURITY - PART 1: ACARS MESSAGE SECURITY |
ISO/IEC 15946-4:2004 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 4: Digital signatures giving message recovery |
CSA ISO/IEC 15946-3 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
BS ISO/IEC/IEEE 8802-22:2015 | Information technology. Telecommunications and information exchange between systems. Local and metropolitan area networks. Specific requirements Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands |
PD CEN/TS 15480-3:2014 | Identification card systems. European Citizen Card European Citizen Card Interoperability using an application interface |
BS ISO/IEC 15946-4:2004 | Information technology. Security techniques. Cryptographic techniques based on elliptic curves Digital signatures giving message recovery |
10/30218910 DC : 0 | BS ISO/IEC IEEE 8802-15-4 - INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - LOCAL AND METROPOLITAN AREA NETWORKS - SPECIFIC REQUIREMENTS - PART 15-4: WIRELESS MEDIUM ACCESS CONTROL (MAC) AND PHYSICAL LAYER (PHY) SPECIFICATIONS FOR LOW-RATE WIRELESS PERSONAL AREA NETWORKS (WPANS) |
07/30161079 DC : 0 | BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
INCITS/ISO/IEC 15946-1 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 1: GENERAL |
BS ISO/IEC 11770-3 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
IEC 62734:2014 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
ANSI X9.65 : 2004 | TRIPLE DATA ENCRYPTION ALGORITHM (TDEA), IMPLEMENTATION STANDARD |
04/30117200 DC : DRAFT DEC 2004 | ISO/IEC 9796-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
CSA ISO/IEC 15946-4 : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 4: DIGITAL SIGNATURES GIVING MESSAGE RECOVERY |
CAN/CSA-ISO/IEC 11770-3:16 | Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques (Adopted ISO/IEC 11770-3:2015, third edition, 2015-08-01) |
BS EN 62734:2015 | Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
ISO/IEC 9796-3:2006 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms |
07/30161082 DC : 0 | BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
ANSI X9/TG-3 : 2006 | RETAIL FINANCIAL SERVICES COMPLIANCE GUIDELINE - ONLINE PIN SECURITY AND KEY MANAGEMENT |
ISO/IEC 14776-333:2013 | Information technology Small Computer System Interface (SCSI) Part 333: SCSI Stream Commands - 3 (SSC-3) |
IEC PAS 62734:2012 | Industrial communication networks - Fieldbus specifications - Wireless systems for industrial automation: process control and related applications |
PD IEC/PAS 62734:2012 | Industrial communication networks. Fieldbus specifications. Wireless systems for industrial automation: process control and related applications |
UNI CEN/TS 15480-3 : 2014 | IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 3: EUROPEAN CITIZEN CARD INTEROPERABILITY USING AN APPLICATION INTERFACE |
TR 103 200 : 1.1.1 | METHODS FOR TESTING AND SPECIFICATION (MTS); EPASSPORT READERS INTEROPERABILITY SUPPORT; FRAMEWORK FOR DEVELOPING CONFORMANCE TEST SPECIFICATIONS |
IEEE 802.15.4-2011 | IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) |
13/30257954 DC : 0 | BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
DD CEN/TS 15480-3:2010 | Identification card systems. European citizen card European citizen card interoperability using an application interface |
BS ISO/IEC 15946-2:2002 | Information technology. Security techniques. Cryptographic techniques based on elliptic curves Digital signatures |
07/30161232 DC : 0 | BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
CAN/CSA-ISO/IEC/IEEE 8802-22:16 | Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 22: Cognitive Wireless RAN Medium Access Control (MCA) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands (Adopted ISO/IEC/IEEE 8802-22:2015, first edition, 2015-05-01) |
IEEE 802.22-2011 | IEEE Standard for Information technology-- Local and metropolitan area networks-- Specific requirements-- Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Policies and procedures for operation in the TV Bands |
ISO/IEC/IEEE 8802-15-4:2018 | Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 15-4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (WPANs) |
ISO/IEC 15946-2:2002 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 2: Digital signatures |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
ISO/IEC 15946-1:2016 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General |
ISO/IEC 15946-3:2002 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 3: Key establishment |
CEN/TS 15480-3:2014 | Identification card systems - European Citizen Card - Part 3: European Citizen Card Interoperability using an application interface |
ANSI X9.84 : 2010(R2017) | BIOMETRIC INFORMATION MANAGEMENT AND SECURITY FOR THE FINANCIAL SERVICES INDUSTRY |
ANSI X9.82-3 : 2007(R2017) | RANDOM NUMBER GENERATION - PART 3: DETERMINISTIC RANDOM BIT GENERATORS |
ANSI X9.79-4 : 2013 | PUBLIC KEY INFRASTRUCTURE (PKI) - PART 4: ASYMMETRIC KEY MANAGEMENT |
ANSI X9.82-1 : 2006(R2013) | RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES |
CAN/CSA-ISO/IEC 15946-1:18 | Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General (Adopted ISO/IEC 15946-1:2016, third edition, 2016-07-01) |
ISO/IEC 8825-2:2015 | Information technology ASN.1 encoding rules: Specification of Packed Encoding Rules (PER) Part 2: |
ISO/IEC 8825-1:2015 | Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1: |
ISO/IEC 8824-2:2015 | Information technology Abstract Syntax Notation One (ASN.1): Information object specification Part 2: |
ISO/IEC 8824-4:2015 | Information technology Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications Part 4: |
ISO/IEC 8824-1:2015 | Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Part 1: |
ISO/IEC 8824-3:2015 | Information technology Abstract Syntax Notation One (ASN.1): Constraint specification Part 3: |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.