PCI-PTS v6规范中对算法类型及强度的要求

所批准的算法是基于NIST SP 800-57 Part1 Rev.4第4节中所列出的算法。

Hash函数:只允许SHA2和SHA3家族额算法,输出大小需要>255bit。MD5和SHA-1不能使用。

用于加密和解密的对称密钥算法:必须使用AES(密钥大小>=128位)或TDES(密钥大小>=112位)。

消息验证码(MAC):CMAC或GMAC可以与AES一起使用,也可以使用经过批准的哈希函数和密钥大小>=128的HMAC。

签名算法: DSA, RSA(PKCS1-v1.5或PSS)和ECDSA,密钥长度要求后面会给出。

通过认证的密钥建立方案为:NIST SP800-56A(基于ECC/FCC的密钥协商方案), NIST SP800-56B(基于IFC的密钥协商方案)和SP800-38F(基于AES的密钥加密/封装)

当算法应用于与密钥传输、交换或建立相关的数据保护时,PCI关于算法及最小密钥长度的要求如下。(其它密钥长度和算法可用于非PCI相关的交易):

补充说明:

1. 除特别说明外,在满足PCI安全要求的设备上使用的所有数字签名都禁止使用SHA-1。这包括设备使用的非设备证书和厂商PKI的一部分,并包括厂商根证书。唯一的例外是,在设备启动时ROM上的初始代码可以使用SHA-1验证自己,但所有后续代码必须使用SHA-2验证。

推荐使用SHA-2或更安全的算法用于其他用途,但SHA-1可以与生成HMAC值和代理PANs(带有salt值)一起使用,用于在密钥派生函数(即KDF)中生成密钥。在使用SHA-1的情况下,测试要求中描述的密钥长度最小值仍需要满足。

2. IFC: Integer Factorization Cryptography, 整数分解密码; ECC: Elliptic Curve Cryptography

Many U.S. Government Information Technology (IT) systems need to employ well-established cryptographic schemes to protect the integrity and confidentiality of the data that they process. Algorithms such as the Advanced Encryption Standard (AES) as defined in Federal Information Processing Standard (FIPS) 197,1 and the Keyed-Hash Message Authentication Code (HMAC) as defined in FIPS 1982 make attractive choices for the provision of these services. These algorithms have been standardized to facilitate interoperability between systems. However, the use of these algorithms requires the establishment of keying material between the participating entities in advance. Trusted couriers may manually distribute this secret keying material. However, as the number of entities using a system grows, the work involved in the distribution of the secret keying material could grow rapidly. Therefore, it is essential to support the cryptographic algorithms used in modern U.S. Government applications with automated key-establishment schemes. A key-establishment scheme can be characterized as either a key-agreement scheme or a key-transport scheme. The asymmetric-key-based key-agreement schemes in this Recommendation are based on the Diffie-Hellman (DH) and Menezes-Qu-Vanstone (MQV) algorithms. Asymmetric-key-based key-establishment schemes using Integer Factorization Cryptography are specified in SP 800-56B.3 The selection of schemes specified in this Recommendation is based on standards for key-establishment schemes developed by the Accredited Standards Committee (ASC) X9, Inc.: ANS X9.42, Agreement of Symmetric Keys using Discrete Logarithm Cryptography, and ANS X9.63, Key Agreement and Key Transport using Elliptic Curve Cryptography.
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

l_z_h

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值