Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

DIN EN ISO 11568-3:1996-11

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

BANKING - KEY MANAGEMENT (RETAIL) - PART 3: KEY LIFE CYCLE FOR SYMMETRIC CIPHERS

Withdrawn date

01-05-2001

Published date

12-01-2013

Sorry this product is not available in your region.

1 Scope
2 Normative references
3 Definitions
4 General environment for key management techniques
4.1 Functionality of a secure cryptographic device
4.2 Double length keys
4.3 Key generation
4.4 Key calculation
4.5 Key hierarchies
5 Techniques for the provision of key management
      services
5.1 Key encipherment
5.2 Key variants
5.3 Key derivation
5.4 Key transformation
5.5 Key offsetting
5.6 Key notarization
5.7 Key tagging
5.8 Key verification
5.9 Key identification
5.10 Controls and audit
6 Key management services cross reference
Annexes
A Notation used in this part of ISO 11568
      A.1 Operators
      A.2 Suffix letters for keys
      A.3 Specific keys and key pairs
B Approved algorithms for symmetric key management
C Abbreviations
D Symmetric cipher examples
E Key variants and control vectors
      E.1 Key variants
      E.2 Control vectors
F Bibliography
1 Scope
2 Normative references
3 Definitions
4 Requirements
4.1 Key generation
4.2 Key storage
4.3 Key retrieval from back up
4.4 Key distribution
4.5 Key use
4.6 Key replacement
4.7 Key destruction
4.8 Key deletion
4.9 Key archive
4.10 Key termination
5 Methods
5.1 Key generation
5.2 Key storage
5.3 Key retrieval from back up
5.4 Key distribution and loading
5.5 Key use
5.6 Key replacement
5.7 Key destruction
5.8 Key deletion
5.9 Key archive
5.10 Key termination
1 Scope
2 Normative references
3 Definitions
4 General environment for key management techniques
4.1 Functionality of a secure cryptographic device
4.2 Double length keys
4.3 Key generation
4.4 Key calculation
4.5 Key hierarchies
5 Techniques for the provision of key management
      services
5.1 Key encipherment
5.2 Key variants
5.3 Key derivation
5.4 Key transformation
5.5 Key offsetting
5.6 Key notarization
5.7 Key tagging
5.8 Key verification
5.9 Key identification
5.10 Controls and audit
6 Key management services cross reference
Annexes
A Notation used in this part of ISO 11568
      A.1 Operators
      A.2 Suffix letters for keys
      A.3 Specific keys and key pairs
B Approved algorithms for symmetric key management
C Abbreviations
D Symmetric cipher examples
E Key variants and control vectors
      E.1 Key variants
      E.2 Control vectors
F Bibliography

Defines security requirements and implementation methods for each step in the key life cycle, applicable to keys at all levels of a key hierarchy. Applies to those institutions responsible for key management for protection of data in transactions originated by bank cards.

DocumentType
Standard
PublisherName
German Institute for Standardisation (Deutsches Institut für Normung)
Status
Withdrawn

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more