BS ISO 10202-5:1998
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
Financial transaction cards. Security architecture of financial transaction systems using integrated circuit cards Use of algorithms
Hardcopy , PDF
01-12-2004
English
15-03-1999
1 Scope
2 Normative references
3 Definitions
4 Notations
4.1 Values and entities
4.2 Processes
4.3 Optionlist
4.4 Functions
4.5 Digital signatures
4.6 Security message format
5 Mapping security functions to process types
6 Process specifications
6.1 Process 1: Key Exchange (KE)
6.1.1 KE-symmetric-symmetric
6.1.2 KE-symmetric-symmetric-mutual-timeliness
6.1.3 KE-symmetric-asymmetric
6.1.4 KE-asymmetric-symmetric
6.1.5 KE-asymmetric-symmetric-mutual
6.1.6 KE-asymmetric-symmetric-mutual-timeliness
6.1.7 KE-asymmetric-asymmetric
6.2 Process 2: Entity Authentication (EA)
6.2.1 EA-symmetric-timeliness
6.2.2 EA-symmetric-timeliness-mutual
6.2.3 EA-asymmetric
6.2.4 EA-asymmetric-timeliness
6.2.5 EA-asymmetric-timeliness-mutual
6.3 Process 3: Message Authentication (MA)
6.3.1 MA-symmetric
6.3.2 MA-symmetric-timeliness
6.3.3 MA-asymmetric
6.3.4 MA-asymmetric-timeliness
6.4 Process 4: Message Encipherment (ME)
6.4.1 ME-symmetric
6.4.2 ME-symmetric-timeliness
6.4.3 ME-asymmetric
6.4.4 ME-asymmetric-timeliness
6.5 Process 5: Transaction Certification (TC)
6.5.1 TC-symmetric
6.5.2 TC-asymmetric
6.5.3 TC-asymmetric-mutual
6.6 Process 6: PIN Verification (PV)
6.6.1 PV symmetric
6.6.2 PV-symmetric-timeliness
6.6.3 PV-asymmetric
6.6.4 PV-asymmetric-timeliness
Annex A (informative) Certification of public keys
Annex B (informative) Key and certificate identifiers
Annex C (informative) Threat matrix
Annex D (informative) ISO security services and security
mechanisms
Annex E (informative) Timeliness
Annex F (informative) Bibliography
Annex G (informative) Process options and functions
Annex H (informative) Mapping ICC classes to process options
Applicable to cryptographic exchanges where at least one node is an ICC or a SAM. Exchanges between other system nodes are outside the scope. The provision of any security function is optional depending upon requirements of the system. Where a specific function is identified as being required, it shall be performed in the manner described herein.
Committee |
IST/12
|
DevelopmentNote |
Supersedes 94/647819 DC. (03/2007)
|
DocumentType |
Standard
|
Pages |
56
|
PublisherName |
British Standards Institution
|
Status |
Withdrawn
|
Supersedes |
Standards | Relationship |
ISO 10202-5:1998 | Identical |
ISO 10202-8:1998 | Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 8: General principles and overview |
ISO 10202-3:1998 | Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 3: Cryptographic key relationships |
ISO 9564-1:2017 | Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems |
ISO 10202-6:1994 | Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 6: Cardholder verification |
ISO 10202-2:1996 | Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 2: Transaction process |
ISO 4909:2000 | Bank cards Magnetic stripe data content for track 3 |
ISO/IEC 9796:1991 | Information technology Security techniques Digital signature scheme giving message recovery |
ISO 10202-7:1998 | Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 7: Key management |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.