• Shopping Cart
    There are no items in your cart

BS ISO 20038:2017

Current

Current

The latest, up-to-date edition.

Banking and related financial services. Key wrap using AES

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

17-11-2017

€217.36
Excluding VAT

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Key wrap method characteristics
6 Key Block Binding key wrap method
Annex A (normative) - Key Block with Optional Block
Annex B (informative) - Numerical example
Bibliography

Specifies a method for packaging cryptographic keys for transport.

Committee
IST/12
DevelopmentNote
Supersedes 16/30304626 DC. (11/2017)
DocumentType
Standard
Pages
32
PublisherName
British Standards Institution
Status
Current

This document defines a method for packaging cryptographic keys for transport. This method can also be used for the storage of keys under an AES key. The method uses the block cipher AES as the wrapping cipher algorithm.

Other methods for wrapping keys are outside the scope of this document but can use the authenticated encryption algorithms specified in ISO/IEC19772.

Standards Relationship
ISO 20038:2017 Identical

ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
ISO 11568-2:2012 Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
ANSI X9.102 : 2008(R2017) Symmetric Key Cryptography For The Financial Services Industry - Wrapping Of Keys And Associated Data
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ISO 16609:2012 Financial services — Requirements for message authentication using symmetric techniques
ANSI X9 TR 31 : 2010 INTEROPERABLE SECURE KEY EXCHANGE KEY BLOCK SPECIFICATION FOR SYMMETRIC ALGORITHMS
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.