BS 7205:1990
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
Procedures for key management to achieve security for financial institutions engaged in financial transactions (wholesale)
Hardcopy , PDF
15-11-2002
English
31-07-1990
National foreword
Committees responsible
Procedure
Introduction
Section 1: General
1 Scope and field of application
2 References
3 Definitions
4 Abbreviations
5 Key management facility
6 Requirements of cryptographic equipment
7 Keying material
Section 2: Manual distribution of keying material
8 Despatch of manually distributed keying material
9 Receipt of manually distributed keying material
Section 3: Automatic distribution of keying material
10 Requirements for the automated key management
architecture
11 Automated key management architecture
12 Encipherment and decipherment of keys and
initialisation vectors
13 Cryptographic Service Messages
14 Generation of the Cryptographic Service Messages
15 Processing Cryptographic Service Messages
Annexes
A An example of manual key distribution and control
procedures
B Notation
C Pseudo-random key and IV generator
D Windows and window management
E Dual Key Translation Centre application
F Keying material. Guidance on clearing and
destruction procedures
Tables
1 Processing counters (message authenticated)
2 Cryptographic Service Message: Fields and subfields
3 Fields used with each message type: Point-to-Point
environment
4 Fields used with each message type: Key Distribution
Centre environment
5 Fields used with each message type: Key Translation
Centre environment
6 Content of fields in DSM
7 Content of fields in ERS
8 Content of fields in ESM
9 Contents of fields in KSM
10 Contents of fields in RFS
11 Contents of fields in RSI
12 Contents of fields in RSM
13 Contents of fields in RTR
14 Processing of DSM
15 Processing of ERS
16 Processing of ESM
17 Processing of KSM
18 Processing of RFS
19 Processing of RSI
20 Processing of RSM
21 Processing of RTR
22 Processing counters with windows (message
authenticated)
Figures
1 Key distribution architecture
2 Encipherment and decipherment of a single key by a
single key
3 Encipherment and decipherment of a single key by a
key pair
4 Encipherment and decipherment of a key pair by a key
pair
5 Point-to-Point environment (normal message flow in
sequence)
6 Point-to-Point environment (message flow with error
messages)
7 Key Distribution Centre environment (normal message
flow)
8 Key Distribution Centre environment (message flow
with Error Service Messages)
9 Key Translation Centre environment (normal message
flow)
10 Key Translation Centre environment (message flow
with error messages)
11 Dual Key Translation Centre application (normal
message flow)
12 Dual Key Translation Centre application (message
flow with errors)
Methods for the management of keying material used for the encipherment, decipherment and authentication of messages exchanged in the course of wholesale financial transactions.
Committee |
IST/12
|
DocumentType |
Standard
|
Pages |
86
|
PublisherName |
British Standards Institution
|
Status |
Withdrawn
|
ISO 8372:1987 | Information processing Modes of operation for a 64-bit block cipher algorithm |
ISO 8731-1:1987 | Banking Approved algorithms for message authentication Part 1: DEA |
ISO/IEC 646:1991 | Information technology ISO 7-bit coded character set for information interchange |
ANSI INCITS 92 : 1981 | DATA ENCRYPTION ALGORITHM |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.