BS ISO 11568-2:2012
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Financial services. Key management (retail) Symmetric ciphers, their key management and life cycle
Hardcopy , PDF
02-03-2023
English
31-03-2012
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 General environment for key management techniques
5 Techniques for the provision of key management services
6 Symmetric key life cycle
7 Key management services cross-reference
Annex A (normative) - Notation used in this part of ISO
Annex B (normative) - Approved algorithms for symmetric
key management
Annex C (normative) - Abbreviations
Bibliography
Describes techniques for the protection of symmetric and asymmetric cryptographic keys in a retail banking environment using symmetric ciphers and the life-cycle management of the associated symmetric keys.
Committee |
IST/12
|
DevelopmentNote |
Supersedes 04/30104260 DC. (02/2006) Supersedes 11/30231373 DC. (03/2012)
|
DocumentType |
Standard
|
Pages |
40
|
PublisherName |
British Standards Institution
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
This part of ISO11568 specifies techniques for the protection of symmetric and asymmetric cryptographic keys in a retail banking environment using symmetric ciphers and the life-cycle management of the associated symmetric keys. The techniques described enable compliance with the principles described in ISO11568-1.
The techniques described are applicable to any symmetric key management operation.
The notation used in this part of ISO11568 is given in AnnexA.
Algorithms approved for use with the techniques described in this part of ISO11568 are given in AnnexB.
Standards | Relationship |
ISO 11568-2:2012 | Identical |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/TR 19038:2005 | Banking and related financial services Triple DEA Modes of operation Implementation guidelines |
ISO 13491-2:2017 | Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO 13491-1:2016 | Financial services — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods |
ISO 16609:2012 | Financial services — Requirements for message authentication using symmetric techniques |
ANSI X9.24-1 : 2017 | RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 1: USING SYMMETRIC TECHNIQUES |
ISO/TR 14742:2010 | Financial services Recommendations on cryptographic algorithms and their use |
ISO 9564-1:2017 | Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems |
ISO 11568-1:2005 | Banking — Key management (retail) — Part 1: Principles |
ISO 11568-4:2007 | Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.