• Shopping Cart
    There are no items in your cart

BS ISO 11568-2:2012

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

Financial services. Key management (retail) Symmetric ciphers, their key management and life cycle

Available format(s)

Hardcopy , PDF

Superseded date

02-03-2023

Superseded by

BS ISO 11568:2023

Language(s)

English

Published date

31-03-2012

€271.12
Excluding VAT

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 General environment for key management techniques
5 Techniques for the provision of key management services
6 Symmetric key life cycle
7 Key management services cross-reference
Annex A (normative) - Notation used in this part of ISO
Annex B (normative) - Approved algorithms for symmetric
         key management
Annex C (normative) - Abbreviations
Bibliography

Describes techniques for the protection of symmetric and asymmetric cryptographic keys in a retail banking environment using symmetric ciphers and the life-cycle management of the associated symmetric keys.

Committee
IST/12
DevelopmentNote
Supersedes 04/30104260 DC. (02/2006) Supersedes 11/30231373 DC. (03/2012)
DocumentType
Standard
Pages
40
PublisherName
British Standards Institution
Status
Superseded
SupersededBy
Supersedes

This part of ISO11568 specifies techniques for the protection of symmetric and asymmetric cryptographic keys in a retail banking environment using symmetric ciphers and the life-cycle management of the associated symmetric keys. The techniques described enable compliance with the principles described in ISO11568-1.

The techniques described are applicable to any symmetric key management operation.

The notation used in this part of ISO11568 is given in AnnexA.

Algorithms approved for use with the techniques described in this part of ISO11568 are given in AnnexB.

Standards Relationship
ISO 11568-2:2012 Identical

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO/TR 19038:2005 Banking and related financial services Triple DEA Modes of operation Implementation guidelines
ISO 13491-2:2017 Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ISO 13491-1:2016 Financial services — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods
ISO 16609:2012 Financial services — Requirements for message authentication using symmetric techniques
ANSI X9.24-1 : 2017 RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 1: USING SYMMETRIC TECHNIQUES
ISO/TR 14742:2010 Financial services Recommendations on cryptographic algorithms and their use
ISO 9564-1:2017 Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems
ISO 11568-1:2005 Banking — Key management (retail) — Part 1: Principles
ISO 11568-4:2007 Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.