BS ISO 11568-5:1998
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
Banking. Key management (retail) Key life cycle for public key cryptosystems
Hardcopy , PDF
15-11-2002
English
15-03-1999
1 Scope
2 Normative references
3 Definitions
4 Dimensions and classification
4.1 Fixing system
4.2 Offset
4.3 Wheel
4.4 Load capacity
5 Requirements
5.1 Standard conditions
5.2 Initial wheel play
5.3 Initial swivel play
5.4 Electrical resistance test
5.5 Fatigue test for braking and/or locking device
5.6 Efficiency check of wheel braking and/or locking
device
5.7 Efficiency check of swivel braking and/or locking
device
5.8 Static test
5.9 Dynamic test
5.10 Efficiency check of wheel braking and/or locking
device
5.11 Efficiency check of swivel braking and/or locking
device
5.12 Final wheel play
5.13 Final swivel play
6 Conformity
7 Marking of the product
7.1 Product marking
7.2 Marking of electrically conductive castor(s) or
wheel(s)1 Scope
2 Normative references
3 Definitions
4 Dimensions and classification
4.1 Fixing system
4.2 Offset
4.3 Wheel
4.4 Load capacity
5 Requirements
5.1 Standard conditions
5.2 Initial wheel play
5.3 Initial swivel play
5.4 Electrical resistance test
5.5 Fatigue test for braking and/or locking device
5.6 Efficiency check of wheel braking and/or locking
device
5.7 Efficiency check of swivel braking and/or locking
device
5.8 Static test
5.9 Dynamic test
5.10 Efficiency check of wheel braking and/or locking
device
5.11 Efficiency check of swivel braking and/or locking
device
5.12 Final wheel play
5.13 Final swivel play
6 Conformity
7 Marking of the product
7.1 Product marking
7.2 Marking of electrically conductive castor(s) or
wheel(s)1 Scope
2 Normative references
3 Terms and definitions
4 General requirements
4.1 Asymmetric key pair generation
4.2 Authenticity prior to use
4.3 Public key certification
4.4 Asymmetric key pair transfer
4.5 Key storage
4.6 Key retrieval
4.7 Public key distribution
4.8 Public key certificate verification
4.9 Key use
4.10 Public key registration
4.11 Public key revocation
4.12 Key replacement
4.13 Private key destruction
4.14 Private key deletion
4.15 Private key termination
4.16 Public key archive
4.17 Key pair recovery
5 Implementation requirements
5.1 Asymmetric key pair generation
5.2 Authenticity prior to use
5.3 Public key certification
5.4 Asymmetric key pair transfer
5.5 Key storage
5.6 Key retrieval
5.7 Public key distribution
5.8 Public key verification
5.9 Key use
5.10 Public key registration
5.11 Public key revocation
5.12 Key replacement
5.13 Private key destruction
5.14 Private key deletion
5.15 Private key termination
5.16 Public key archive
5.17 Key pair recovery
Defines for the retail banking environment the security requirements and the implementation methods for each step in the key life cycle for both the private key and the public key of an asymmetric key pair. Applies to any organization which is responsible for implementing techniques based on public key cryptosystems for the management of keys used to protect data.
Committee |
IST/12
|
DevelopmentNote |
Supersedes 95/645154 DC. (03/2007)
|
DocumentType |
Standard
|
Pages |
22
|
PublisherName |
British Standards Institution
|
Status |
Withdrawn
|
Supersedes |
Standards | Relationship |
ISO 11568-5:1998 | Identical |
ISO 11568-2:2012 | Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
ISO 9564-1:2017 | Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems |
ISO 11568-1:2005 | Banking — Key management (retail) — Part 1: Principles |
ISO 11568-4:2007 | Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
ISO 11568-3:1994 | Banking Key management (retail) Part 3: Key life cycle for symmetric ciphers |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.