BS ISO 15668:1999
Current
The latest, up-to-date edition.
Banking. Secure file transfer (retail)
Hardcopy , PDF
English
15-04-2000
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Principles
5 Application
6 Authentication mechanisms
Annexes
A (informative) Mechanism examples
B (informative) An example of implementation
C (informative) An example for ensuring file transfer
integrity validation
D (informative) Graphics overview of security services
with references
Applicable to different types of file transfer used in retail banking, but not to transaction messages as given in ISO 8583.
Committee |
IST/12
|
DevelopmentNote |
Reviewed and confirmed by BSI, December, 2004. (11/2004) Supersedes 98/647188 DC. (05/2005)
|
DocumentType |
Standard
|
Pages |
42
|
PublisherName |
British Standards Institution
|
Status |
Current
|
Supersedes |
Standards | Relationship |
ISO 15668:1999 | Identical |
ISO/IEC 13888-2:2010 | Information technology Security techniques Non-repudiation Part 2: Mechanisms using symmetric techniques |
ISO/IEC 9798-3:1998 | Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques |
ISO 8372:1987 | Information processing Modes of operation for a 64-bit block cipher algorithm |
ISO 8731-1:1987 | Banking Approved algorithms for message authentication Part 1: DEA |
ISO/IEC 13888-3:2009 | Information technology Security techniques Non-repudiation Part 3: Mechanisms using asymmetric techniques |
ISO/IEC 9798-4:1999 | Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function |
ISO/IEC 9798-2:2008 | Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
ISO 9807:1991 | Banking and related financial services Requirements for message authentication (retail) |
ISO 9564-1:2017 | Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems |
ISO/IEC 10118-1:2016 | Information technology Security techniques Hash-functions Part 1: General |
ISO/IEC 9796-2:2010 | Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 9796:1991 | Information technology Security techniques Digital signature scheme giving message recovery |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
ISO/IEC 9797:1994 | Information technology — Security techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.