Frames | No Frames

Return to Stylus Studio EDIFACT home page.
Return to Stylus Studio EDIFACT 40101 Code List page.

0523 -

Use of algorithm, coded
UN/EDIFACT Syntax Version 4 Release 1 Revision 1 Service Code List

Repr:an..3
Desc:Specification of the usage made of the algorithm.
This table also occurs in the following versions of this standard:
40000, 40001, 40002, 40003, 40004, 40005, 40006, 40007, 40100, 40101, 40102

1Owner hashing
Specifies that the algorithm is used by the message sender to compute the hash function on the message (as in the case of Integrity or Non-repudiation of Origin identified in the security function qualifier of USH).
2Owner symmetric
Specifies that the algorithm is used by the message sender either for integrity, confidentiality, or message origin authentication (specified by security service, coded in USH).
3Issuer signing
Specifies that the algorithm is used by the Certificate Issuer (CA) to sign the hash result computed on the certificate.
4Issuer hashing
Specifies that the algorithm is used by the Certificate Issuer (CA) to compute the hash result on the certificate.
5Owner enciphering
Specifies that the algorithm is used by the message sender to encrypt a symmetric key.
6Owner signing
Specifies that the algorithm is used by the message sender to sign either the hash result computed on the message or the symmetric keys.
7Owner enciphering or signing
Specifies that the algorithm may be used by the message sender either to encrypt a symmetric key or sign the hash result computed on the message. This value may only be used in a USA segment within a USC segment group. When encrypting a symmetric key a receiver certificate shall be used. When signing a hash result a sender certificate shall be used.
8Owner compressing
Specifies that the algorithm is used by the message sender to compress the data before (encryption and) submission.
9Owner compression integrity
Specifies that the algorithm is used by the message sender on the compressed data before (encryption and) submission. The integrity value is used to verify the contents of the compressed text before expansion.
10Key agreement
Specifies that the algorithm is used by the initiator and responder to agree a secret key.

Change indicators
plus sign An addition.
asterisk Addition/substraction/change to a code entry for a particular data element.
hash or pound sign Changes to names.
vertical bar Changes to text for descriptions, notes and functions.
minus sign A deletion.
letter X Marked for deletion.

Return to Stylus Studio EDIFACT 40101 Code List page.
EDI to XML Mapping for EDIFACT/X12 Convert EDIFACT/X12 Schemas to XML Schema Legacy Data Conversion Tools Access Relational Data as XML Visual XSLT and XQuery Mapping Tools EDIFACT to XML
Return to Stylus Studio EDIFACT home page.

Return to Stylus Studio home page.
Site Map | Privacy Policy | Terms of Use | Trademarks
Stylus Scoop XML Newsletter:
W3C Member
Stylus Studio® and DataDirect XQuery ™are from DataDirect Technologies, is a registered trademark of Progress Software Corporation, in the U.S. and other countries. © 2004-2016 All Rights Reserved.