Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

BS ISO 10202-7:1998

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

Financial transaction cards. Security architecture of financial transaction systems using integrated circuit cards Key management

Available format(s)

Hardcopy , PDF

Withdrawn date

01-12-2004

Language(s)

English

Published date

15-04-2000

$520.16
Including GST where applicable

1 Scope
2 Normative references
3 Definitions
      3.1 Definitions
      3.2 Abbreviations
4 General security principles
5 ICC systems key management requirements
      5.1 ICC and SAM life cycle
      5.2 Key life cycle protection
      5.3 Key separation
      5.4 Key management services
      5.5 Key relationships
      5.6 On-line transaction processing
      5.7 Off-line transaction processing using a SAM
      5.8 CDF and ADF keys
      5.9 Physical security
      5.10 CADs without a SAM
6 ICC systems cryptographic keys
      6.1 Definition of cryptographic keys
      6.2 Key hierarchy
7 Key life cycle
      7.1 Key generation
      7.2 Key storage
      7.3 Key backup
      7.4 Key distribution and loading
      7.5 Key use
      7.6 Key replacement
      7.7 Key destruction
      7.8 Key deletion
      7.9 Key archive
      7.10 Key termination
      7.11 Reserve keys
8 Key management service
      8.1 Key encipherment
      8.2 Key derivation
      8.3 Key offsetting
      8.4 Key notarization
      8.5 Key tagging
      8.6 Key verification
      8.7 Key identification
             8.7.1 Implicit key identification
             8.7.2 Explicit key identification
      8.8 Controls and audits
9 ICC and SAM key loading processes
      9.1 Loading of initial symmetric keys
      9.2 Loading of production keys
      9.3 Loading of issuer keys
      9.4 Loading of ADF keys
      9.5 Loading of public keys
      9.6 Loading of secret keys of asymmetric algorithms
      9.7 Generation of asymmetric public/secret key pairs
      9.8 Test keys
10 Symmetric key management techniques
      10.1 Derivation of ICC and SAM keys
      10.2 Key Management Technique 1: Static data keys
      10.3 Key Management Technique 2: Session keys
      10.4 Key Management Technique 3: Unique message keys
      10.5 Length of keys
11 Asymmetric key management techniques
      11.1 Use of asymmetric key management in a CAD with a
             SAM
      11.2 Use ofout a SAM
      11.3 Public key certification requirements
      11.4 Secure storage of secret keys
      11.5 Secure storage of public keys
      11.6 Exchange of certified public keys
      11.7 Key length
      11.8 Secure protocols
12 Combined asymmetric/symmetric key management
      12.1 Basic requirement
      12.2 Exchange of symmetric keys
Annex A (informative) Examples of card life cycle using
                      symmetric key management
Annex B (informative) Examples of symmetric key management
                      techniques 1, 2 and 3
Annex C (informative) Example of transaction processing key
                      management using symmetric key
                      management technique 3 with implicit
                      key identification
Annex D (informative) Example of transaction processing key
                      management using public key management
                      in a CAD with a SAM
Annex E (informative) Example of transaction processing key
                      management using public key management
                      in a CAD without a SAM

Defines key management requirements for financial transaction systems using integrated circuit cards. Specifies procedures and processes for the secure management of cryptographic keys used during the card life cycle and transaction processing in an integrated circuit card environment. Asymmetric and symmetric key management schemes are addressed. Minimum key management requirements are specified.

Committee
IST/12
DevelopmentNote
Supersedes 94/647820 DC. (03/2007)
DocumentType
Standard
Pages
36
PublisherName
British Standards Institution
Status
Withdrawn
Supersedes

Standards Relationship
ISO 10202-7:1998 Identical

ISO 7812:1987 Identification cards — Numbering system and registration procedure for issuer identifiers
ISO/IEC 7812-2:2017 Identification cards — Identification of issuers — Part 2: Application and registration procedures
ISO 10202-8:1998 Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 8: General principles and overview
ISO 11568-2:2012 Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
ISO 11568-6:1998 Banking Key management (retail) Part 6: Key management schemes
ISO 13491-1:2016 Financial services — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods
ISO 10202-3:1998 Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 3: Cryptographic key relationships
ISO/IEC 7816-4:2013 Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange
ISO 10202-6:1994 Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 6: Cardholder verification
ISO 11568-1:2005 Banking — Key management (retail) — Part 1: Principles
ISO/IEC 7816-3:2006 Identification cards — Integrated circuit cards — Part 3: Cards with contacts — Electrical interface and transmission protocols
ISO 9992-1:1990 Financial transaction cards Messages between the integrated circuit card and the card accepting device Part 1: Concepts and structures
ISO 10202-2:1996 Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 2: Transaction process
ISO/IEC 7812-1:2017 Identification cards — Identification of issuers — Part 1: Numbering system
ISO 11568-4:2007 Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
ISO 11568-3:1994 Banking Key management (retail) Part 3: Key life cycle for symmetric ciphers
ISO/IEC 7816-5:2004 Identification cards — Integrated circuit cards — Part 5: Registration of application providers
ISO 10202-5:1998 Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 5: Use of algorithms
ISO 11568-5:1998 Banking Key management (retail) Part 5: Key life cycle for public key cryptosystems
ISO/IEC 9796:1991 Information technology Security techniques Digital signature scheme giving message recovery

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more