Beko LCD panel Manual de usuario Pagina 15

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 18
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 14
BEKO 300TR Security Policy V1.5
14
All information contained in this document is property of Arçelik A.Ş..
This document can't be used, copied, disclosed or divulged in whole or in part for any purpose by any person without the
written approval of Arçelik A.Ş..
8 Key Management
CTOS KMS2 shall be used for key management, using other methods for key
management will invalidate the PCI PTS approval of the device.
8.1 Key Management Techniques
The device equips the key management techniques as below,
Master Key / Session Key, the technique based on a hierarchy of keys. Master Key
is directly used to encrypt Session Keys which is unique per transaction. The
technique is specified in document [3].
DUKPT, the technique based on a unique key per transaction, as specified in
document [3].
8.2 Cryptographic Algorithms
The device includes the algorithms as below,
TDES (112 bits and 168 bits)
AES (192 bits)
RSA (Signature Verification, 2048 bits)
SHA256
8.3 Key Type and Usage
The supported transaction key of device lists as below,
PIN Encryption Key, such keys are used to protect cardholder PIN, and generate
cipher-text PIN block.
Data Encryption Key, such keys are used for data encryption only.
MAC Key, such keys are used to generate message authentication code.
Key Block Protection Key, such keys are used to calculate the data key and MAC
key for TR31 specified in document [4].
IPEK (Initial PIN Encryption Key), such keys are used to calculate session keys for
each transaction. The technique is specified in document [3].
Vista de pagina 14
1 2 ... 10 11 12 13 14 15 16 17 18

Comentarios a estos manuales

Sin comentarios