BS ISO 10202-5:1998
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
Financial transaction cards. Security architecture of financial transaction systems using integrated circuit cards Use of algorithms
Hardcopy , PDF
English
15-03-1999
01-12-2004
1 Scope
2 Normative references
3 Definitions
4 Notations
4.1 Values and entities
4.2 Processes
4.3 Optionlist
4.4 Functions
4.5 Digital signatures
4.6 Security message format
5 Mapping security functions to process types
6 Process specifications
6.1 Process 1: Key Exchange (KE)
6.1.1 KE-symmetric-symmetric
6.1.2 KE-symmetric-symmetric-mutual-timeliness
6.1.3 KE-symmetric-asymmetric
6.1.4 KE-asymmetric-symmetric
6.1.5 KE-asymmetric-symmetric-mutual
6.1.6 KE-asymmetric-symmetric-mutual-timeliness
6.1.7 KE-asymmetric-asymmetric
6.2 Process 2: Entity Authentication (EA)
6.2.1 EA-symmetric-timeliness
6.2.2 EA-symmetric-timeliness-mutual
6.2.3 EA-asymmetric
6.2.4 EA-asymmetric-timeliness
6.2.5 EA-asymmetric-timeliness-mutual
6.3 Process 3: Message Authentication (MA)
6.3.1 MA-symmetric
6.3.2 MA-symmetric-timeliness
6.3.3 MA-asymmetric
6.3.4 MA-asymmetric-timeliness
6.4 Process 4: Message Encipherment (ME)
6.4.1 ME-symmetric
6.4.2 ME-symmetric-timeliness
6.4.3 ME-asymmetric
6.4.4 ME-asymmetric-timeliness
6.5 Process 5: Transaction Certification (TC)
6.5.1 TC-symmetric
6.5.2 TC-asymmetric
6.5.3 TC-asymmetric-mutual
6.6 Process 6: PIN Verification (PV)
6.6.1 PV symmetric
6.6.2 PV-symmetric-timeliness
6.6.3 PV-asymmetric
6.6.4 PV-asymmetric-timeliness
Annex A (informative) Certification of public keys
Annex B (informative) Key and certificate identifiers
Annex C (informative) Threat matrix
Annex D (informative) ISO security services and security
mechanisms
Annex E (informative) Timeliness
Annex F (informative) Bibliography
Annex G (informative) Process options and functions
Annex H (informative) Mapping ICC classes to process options
Applicable to cryptographic exchanges where at least one node is an ICC or a SAM. Exchanges between other system nodes are outside the scope. The provision of any security function is optional depending upon requirements of the system. Where a specific function is identified as being required, it shall be performed in the manner described herein.
| Committee |
IST/12
|
| DevelopmentNote |
Supersedes 94/647819 DC. (03/2007)
|
| DocumentType |
Standard
|
| Pages |
56
|
| PublisherName |
British Standards Institution
|
| Status |
Withdrawn
|
| Supersedes |
| Standards | Relationship |
| ISO 10202-5:1998 | Identical |
| ISO 10202-8:1998 | Financial transaction cards — Security architecture of financial transaction systems using integrated circuit cards — Part 8: General principles and overview |
| ISO 10202-3:1998 | Financial transaction cards — Security architecture of financial transaction systems using integrated circuit cards — Part 3: Cryptographic key relationships |
| ISO 9564-1:2017 | Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems |
| ISO 10202-6:1994 | Financial transaction cards — Security architecture of financial transaction systems using integrated circuit cards — Part 6: Cardholder verification |
| ISO 10202-2:1996 | Financial transaction cards — Security architecture of financial transaction systems using integrated circuit cards — Part 2: Transaction process |
| ISO 4909:2000 | Bank cards — Magnetic stripe data content for track 3 |
| ISO/IEC 9796:1991 | Information technology — Security techniques — Digital signature scheme giving message recovery |
| ISO 10202-7:1998 | Financial transaction cards — Security architecture of financial transaction systems using integrated circuit cards — Part 7: Key management |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.