• There are no items in your cart

EN ISO 11568-2 : 1996

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

BANKING - KEY MANAGEMENT (RETAIL) - PART 2: KEY MANAGEMENT TECHNIQUES FOR SYMMETRIC CIPHERS

Withdrawn date

23-07-2013

Published date

12-01-2013

Sorry this product is not available in your region.

1 Scope
2 Normative references
3 Definitions
4 General environment for key management techniques
  4.1 Functionality of a secure cryptographic device
  4.2 Double length keys
  4.3 Key generation
  4.4 Key calculation
  4.5 Key hierarchies
5 Techniques for the provision of key management
  services
  5.1 Key encipherment
  5.2 Key variants
  5.3 Key derivation
  5.4 Key transformation
  5.5 Key offsetting
  5.6 Key notarization
  5.7 Key tagging
  5.8 Key verification
  5.9 Key identification
  5.10 Controls and audit
6 Key management services cross reference
Annex A (normative) Notation used in this part of ISO 11568
  A.1 Operators
  A.2 Suffix letters for keys
  A.3 Specific keys and key pairs
Annex B (normative) Approved algorithms for symmetric key
                      management
Annex C (normative) Abbreviations
Annex D (informative) Symmetric cipher examples
Annex E (informative) Key variants and control vectors
      E.1 Key variants
      E.2 Control vectors
Annex F (informative) Bibliography

Defines techniques for protecting cryptographic keys for symmetric ciphers in a retail banking environment, for use in implementing procedures for protection of keys during the life cycle.

Committee
TC 224
DocumentType
Standard
PublisherName
Comite Europeen de Normalisation
Status
Withdrawn

ISO 11568-1:2005 Banking — Key management (retail) — Part 1: Principles
ANSI INCITS 92 : 1981 DATA ENCRYPTION ALGORITHM
ISO 11568-3:1994 Banking Key management (retail) Part 3: Key life cycle for symmetric ciphers
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.