中国金融集成电路IC卡借记贷记规范v2安全部分.docx
《中国金融集成电路IC卡借记贷记规范v2安全部分.docx》由会员分享,可在线阅读,更多相关《中国金融集成电路IC卡借记贷记规范v2安全部分.docx(7页珍藏版)》请在冰豆网上搜索。
中国金融集成电路IC卡借记贷记规范v2安全部分
中国金融集成电路(IC)卡借记贷记规范v2-安全部分
中国金融集成电路(IC)卡
借记/贷记规范第四部分:
安全规范
中国金融集成电路(IC)卡标准修订工作组
二零零四年九月
目次
1.2.3.4.5.6.
引言.......................................................................................................................................................1范围.......................................................................................................................................................1参考资料................................................................................................................................................1定义.......................................................................................................................................................1缩略语和符号........................................................................................................................................4脱机数据认证........................................................................................................................................6
密钥和证书....................................................................................................................................76.1.1认证中心...................................................................................................................................76.1.2公开密钥对................................................................................................................................76.2
静态数据认证(SDA).................................................................................................................86.2.1密钥和证书..............................................................................................................................116.2.2认证中心公钥获取...................................................................................................................136.2.3发卡行公钥获取.......................................................................................................................136.2.4签名的静态应用数据验证........................................................................................................146.3
动态数据认证(DDA)...............................................................................................................156.3.1密钥和证书..............................................................................................................................186.3.2认证中心公钥的获取...............................................................................................................206.3.3发卡行公钥的获取...................................................................................................................206.3.4IC卡公钥的获取......................................................................................................................226.3.5标准动态数据认证...................................................................................................................236.3.6复合动态数据认证/应用密文生成(CDA)..................................................................................257.
应用密文和发卡行认证........................................................................................................................30
应用密文产生..............................................................................................................................307.1.1数据源选择..............................................................................................................................307.1.2应用密文算法..........................................................................................................................317.27.38.8.18.2
发卡行认证..................................................................................................................................31密钥管理.....................................................................................................................................31报文格式.....................................................................................................................................32报文完整性及其验证...................................................................................................................32
7.1
6.1
安全报文..............................................................................................................................................31
8.2.1命令数据域..............................................................................................................................328.2.2MAC过程密钥分散..................................................................................................................328.2.3MAC的计算............................................................................................................................328.3
报文私密性..................................................................................................................................328.3.1命令数据域...................