Hello. Sign In
Standards Store

ANSI X9.24-1

2009 Edition, October 13, 2009

Complete Document

Retail Financial Services Symmetric Key Management Part 1: Using Symmetric Techniques

View Abstract
Product Details
Document History

Detail Summary

Active, Most Current

Price (USD)
Add to Cart

People Also Bought These:

ACI 318
ANSI B92.1

Product Details:

  • Revision: 2009 Edition, October 13, 2009
  • Published Date: October 13, 2009
  • Status: Active, Most Current
  • Document Language: English
  • Published By: Accredited Standards Committee/X9 (ASC/X9)
  • Page Count: 71
  • ANSI Approved: Yes
  • DoD Adopted: No

Description / Abstract:

This part of this standard covers both the manual and automated management of keying material used for financial services such as point-of-sale (POS) transactions (debit and credit), automated teller machine (ATM) transactions, messages among terminals and financial institutions, and interchange messages among acquirers, switches and card issuers. This part of this standard deals exclusively with management of symmetric keys using symmetric techniques. This part of this standard specifies the minimum requirements for the management of keying material. Addressed are all components of the key management life cycle including generation, distribution, utilization, storage, archiving, replacement and destruction of the keying material. An institution's key management process, whether implemented in a computer or a terminal, is not to be implemented or controlled in a manner that has less security, protection, or control than described herein. It is intended that two nodes, if they implement compatible versions of

• the same secure key management method,

• the same secure key identification technique approved for a particular method, and

• the same key separation methodologies

in accordance with this part of this standard will be interoperable at the application level. Other characteristics may be necessary for node interoperability; however, this part of this standard does not cover such characteristics as message format, communications protocol, transmission speed, or device interface.