Key Management conforms to AS 2805 part 6.1.
Each interchange node contains an Interchange Send Key Encrypting Key (KEKs) and an Interchange Receive Key Encrypting Key (KEKr). The Interchange Send KEK is the same key as the Interchange Receive KEK in the partnering node, similarly the Interchange Receive KEK is the same as the Interchange Send KEK in the partnering node.
The Interchange Key Encrypting Keys are used to encipher and decipher the session keys when they are transmitted between the nodes and in the proof of end points process.
Interchange Key Encrypting Keys is statistically unique and shall be changed, at a minimum, once every two years.
|Node A||Node B|
Each node keeps four sets of session keys, two send sets and two receive sets.
Each set of session keys consists of two keys, MAC Key, PIN Protect Key. Each session key is 128-bits long and stored in a secure manner.
The send session key sets are generated by the sending node and numbered “1” or “2”. The send session key sets are then forwarded to the receiving node to be used as the receive session key sets.
The receive session key sets are received in a 0820 Network Management Advice message with bit ‘070’ equal to 101 from the sending node. The set number of either “1” or “2” contained in bit 53 indicates the receive session key set used by the receiving node to verify the MAC, decipher the data and translate or verify the PIN.
One set of send session keys is used at a time and all Transactions sent from the sending node will generate the MAC and encipher the PIN, if present, using the MAC Generator Key and PIN Protect Key, respectively, from the same send session key set. The send session key set used is indicated by bit 53 (contains “1” or “2”) in each message. Session Keys must be statistically unique and replaced, at a minimum, once every hour or on every 256 Transactions, whichever occurs first.
|Node A||Node B|
|Send Session Keys Set 1||Receive Session Keys Set 1|
|MAC Key (KMACs1)||=||MAC Verification Key (KMACr1)|
|PIN Protect Key (KPEs1)||=||PIN Protect Key (KPEr1)|
|Send Session Keys Set 2||Receive Session Keys Set 2|
|MAC Key (KMACs2)||=||MAC Verification Key (KMACr2)|
|PIN Protect Key (KPEs2)||=||PIN Protect Key (KPEr2)|
|Receive Session Keys Set 1||Send Session Keys Set 1|
|MAC Verification Key (KMACr1)||=||MAC Key (KMACs1)|
|PIN Protect Key (KPEr1)||=||PIN Protect Key (KPEs1)|
|Receive Session Keys Set 2||Send Session Keys Set 2|
|MAC Verification Key (KMACr2)||=||MAC Key (KMACs2)|
|PIN Protect Key (KPEr2)||=||PIN Protect Key (KPEs2)|
When enciphered for transmission, each session key type will use a unique variant of the Key Enciphering Key in accordance with AS 2805 part 6.1 request response (logon) from the other before starting any other message exchange. When ready to logon, a party should attempt to logon and continue to attempt to logon until a successful response has been received. Upon receipt of an unsolicited logon (i.e. receiving a logon message when in an assumed logged on state) or a message with a response code indicating an irrecoverable error, a party should send an immediate logoff message and attempts to logon should be made as soon as possible. All logon response messages should be inspected to ensure that the response code indicates a successful logon
Changing Session keys
While one set of send session keys is being used, the other send session key set is randomly generated by the sending node and their KVCs generated, the keys are then enciphered under the Interchange Send KEK and transmitted to the receiving node in a 0820 Network Management Advice message.
When a 0820 message is received by the receiving node, the session keys are deciphered using the Interchange Receive KEK. These deciphered keys are set up as the set of receive keys specified by the set number contained in bit 53 of the 0820 message. The Key Verification Codes (KVCs) are calculated by the receiving node and transmitted to the sending node in bit 48 of the 0830 message.
When the 0830 Network Management Advice response message is received at the node initiating the key change, the KVCs contained in the 0830 message are validated. If the KVCs are correct, the new send session key set can be used immediately. If the KVCs are invalid, new send session key set must be generated and the whole process is repeated.
Either node may terminate the transmission of financial messages by sending a Sign Off Advice. A Sign Off is accomplished by the transmission of a 0820 Network Management Advice Message with a NMIC (Bit 70) equal to ‘002’.
Key change during normal processing
A session key change can occur at any time; each node independently initiates the change of their send keys. The sender will advise their sending session keys to the receiver using a 0820 Network Management Advice message with a NMIC equal to ‘101’ indicating key change. Once a valid response (0830 message) is received and the KVCs confirmed, the new keys can be used.
Excellent article. I absolutely appreciate this website.
Great post! We will be linking to this great article on our website. Keep up the great writing.|
Fantastic website. A lot of useful info here. I’m sending it to some friends ans also sharing in delicious. And obviously, thanks on your sweat!|