BS ISO 10202-7:1998
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
Financial transaction cards. Security architecture of financial transaction systems using integrated circuit cards Key management
Hardcopy , PDF
01-12-2004
English
15-04-2000
1 Scope
2 Normative references
3 Definitions
3.1 Definitions
3.2 Abbreviations
4 General security principles
5 ICC systems key management requirements
5.1 ICC and SAM life cycle
5.2 Key life cycle protection
5.3 Key separation
5.4 Key management services
5.5 Key relationships
5.6 On-line transaction processing
5.7 Off-line transaction processing using a SAM
5.8 CDF and ADF keys
5.9 Physical security
5.10 CADs without a SAM
6 ICC systems cryptographic keys
6.1 Definition of cryptographic keys
6.2 Key hierarchy
7 Key life cycle
7.1 Key generation
7.2 Key storage
7.3 Key backup
7.4 Key distribution and loading
7.5 Key use
7.6 Key replacement
7.7 Key destruction
7.8 Key deletion
7.9 Key archive
7.10 Key termination
7.11 Reserve keys
8 Key management service
8.1 Key encipherment
8.2 Key derivation
8.3 Key offsetting
8.4 Key notarization
8.5 Key tagging
8.6 Key verification
8.7 Key identification
8.7.1 Implicit key identification
8.7.2 Explicit key identification
8.8 Controls and audits
9 ICC and SAM key loading processes
9.1 Loading of initial symmetric keys
9.2 Loading of production keys
9.3 Loading of issuer keys
9.4 Loading of ADF keys
9.5 Loading of public keys
9.6 Loading of secret keys of asymmetric algorithms
9.7 Generation of asymmetric public/secret key pairs
9.8 Test keys
10 Symmetric key management techniques
10.1 Derivation of ICC and SAM keys
10.2 Key Management Technique 1: Static data keys
10.3 Key Management Technique 2: Session keys
10.4 Key Management Technique 3: Unique message keys
10.5 Length of keys
11 Asymmetric key management techniques
11.1 Use of asymmetric key management in a CAD with a
SAM
11.2 Use ofout a SAM
11.3 Public key certification requirements
11.4 Secure storage of secret keys
11.5 Secure storage of public keys
11.6 Exchange of certified public keys
11.7 Key length
11.8 Secure protocols
12 Combined asymmetric/symmetric key management
12.1 Basic requirement
12.2 Exchange of symmetric keys
Annex A (informative) Examples of card life cycle using
symmetric key management
Annex B (informative) Examples of symmetric key management
techniques 1, 2 and 3
Annex C (informative) Example of transaction processing key
management using symmetric key
management technique 3 with implicit
key identification
Annex D (informative) Example of transaction processing key
management using public key management
in a CAD with a SAM
Annex E (informative) Example of transaction processing key
management using public key management
in a CAD without a SAM
Defines key management requirements for financial transaction systems using integrated circuit cards. Specifies procedures and processes for the secure management of cryptographic keys used during the card life cycle and transaction processing in an integrated circuit card environment. Asymmetric and symmetric key management schemes are addressed. Minimum key management requirements are specified.
Committee |
IST/12
|
DevelopmentNote |
Supersedes 94/647820 DC. (03/2007)
|
DocumentType |
Standard
|
Pages |
36
|
PublisherName |
British Standards Institution
|
Status |
Withdrawn
|
Supersedes |
Standards | Relationship |
ISO 10202-7:1998 | Identical |
ISO 7812:1987 | Identification cards — Numbering system and registration procedure for issuer identifiers |
ISO/IEC 7812-2:2017 | Identification cards — Identification of issuers — Part 2: Application and registration procedures |
ISO 10202-8:1998 | Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 8: General principles and overview |
ISO 11568-2:2012 | Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
ISO 11568-6:1998 | Banking Key management (retail) Part 6: Key management schemes |
ISO 13491-1:2016 | Financial services — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods |
ISO 10202-3:1998 | Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 3: Cryptographic key relationships |
ISO/IEC 7816-4:2013 | Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange |
ISO 10202-6:1994 | Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 6: Cardholder verification |
ISO 11568-1:2005 | Banking — Key management (retail) — Part 1: Principles |
ISO/IEC 7816-3:2006 | Identification cards — Integrated circuit cards — Part 3: Cards with contacts — Electrical interface and transmission protocols |
ISO 9992-1:1990 | Financial transaction cards Messages between the integrated circuit card and the card accepting device Part 1: Concepts and structures |
ISO 10202-2:1996 | Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 2: Transaction process |
ISO/IEC 7812-1:2017 | Identification cards — Identification of issuers — Part 1: Numbering system |
ISO 11568-4:2007 | Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
ISO 11568-3:1994 | Banking Key management (retail) Part 3: Key life cycle for symmetric ciphers |
ISO/IEC 7816-5:2004 | Identification cards — Integrated circuit cards — Part 5: Registration of application providers |
ISO 10202-5:1998 | Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 5: Use of algorithms |
ISO 11568-5:1998 | Banking Key management (retail) Part 5: Key life cycle for public key cryptosystems |
ISO/IEC 9796:1991 | Information technology Security techniques Digital signature scheme giving message recovery |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.