Frames | No Frames

Return to EDIFACT 40006 Code List page.

0523 -

Use of algorithm, coded
UN/EDIFACT Syntax Version 4 Revision 6 Service Code List

Repr:an..3
Desc:Specification of the usage made of the algorithm.
This table also occurs in the following versions of this standard:
40000, 40001, 40002, 40003, 40004, 40005, 40006, 40007, 40100, 40101, 40102

1Owner hashing
Specifies that the algorithm is used by the message sender to compute the hash function on the message (as in the case of Integrity or Non-repudiation of Origin identified in the security function qualifier of USH).
2Owner symmetric
Specifies that the algorithm is used by the message sender either for integrity, confidentiality, or message origin authentication (specified by security service, coded in USH).
3Issuer signing
Specifies that the algorithm is used by the Certificate Issuer (CA) to sign the hash result computed on the certificate.
4Issuer hashing
Specifies that the algorithm is used by the Certificate Issuer (CA) to compute the hash result on the certificate.
5Owner enciphering
Specifies that the algorithm is used by the message sender to encrypt a symmetric key.
6Owner signing
Specifies that the algorithm is used by the message sender to sign either the hash result computed on the message or the symmetric keys.
7Owner enciphering or signing
Specifies that the algorithm may be used by the message sender either to encrypt a symmetric key or sign the hash result computed on the message. This value may only be used in a USA segment within a USC segment group. When encrypting a symmetric key a receiver certificate shall be used. When signing a hash result a sender certificate shall be used.
8Owner compressing
Specifies that the algorithm is used by the message sender to compress the data before (encryption and) submission.
9Owner compression integrity
Specifies that the algorithm is used by the message sender on the compressed data before (encryption and) submission. The integrity value is used to verify the contents of the compressed text before expansion.
10Key agreement
Specifies that the algorithm is used by the initiator and responder to agree a secret key.

Change indicators
plus sign An addition.
asterisk Addition/substraction/change to a code entry for a particular data element.
hash or pound sign Changes to names.
vertical bar Changes to text for descriptions, notes and functions.
minus sign A deletion.
letter X Marked for deletion.

Return to EDIFACT 40006 Code List page.