• There are no items in your cart

I.S. EN ISO 11568-1:1997

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

BANKING - KEY MANAGEMENT (RETAIL) - PART 1: INTRODUCTION TO KEY MANAGEMENT

Available format(s)

Hardcopy , PDF

Withdrawn date

12-01-2000

Language(s)

English

Published date

11-04-1997

For Harmonized Standards, check the EU site to confirm that the Standard is cited in the Official Journal.

Only cited Standards give presumption of conformance to New Approach Directives/Regulations.


Dates of withdrawal of national standards are available from NSAI.

€53.00
Excluding VAT

1 Scope
2 Normative reference
3 Definitions
4 Introduction to key management
  4.1 Purpose of security
  4.2 Level of security
  4.3 Key management objectives
5 Principles of key management
6 Cipher systems
  6.1 Symmetric ciphers
  6.2 Asymmetric ciphers
7 Cryptographic environments
  7.1 Secure cryptographic device
  7.2 Physically secure environment
  7.3 Security considerations for secret keys
  7.4 Security considerations for public keys
  7.5 Protection against counterfeit devices
8 Key management services for symmetric ciphers
  8.1 Separation
  8.2 Substitution prevention
  8.3 Identification
  8.4 Synchronization (availability)
  8.5 Integrity
  8.6 Confidentiality
  8.7 Compromise detection
9 Key life cycle for symmetric ciphers
  9.1 Generation
  9.2 Storage
  9.3 Backup
  9.4 Distribution and loading
  9.5 Use
  9.6 Replacement
  9.7 Destruction
  9.8 Deletion
  9.9 Archive
  9.10 Termination
Annex A (normative) Procedure for approval of a
                    cryptographic algorithm
  A.1 Justification of proposal
  A.2 Documentation
  A.3 Public disclosure
  A.4 Examination of proposals
  A.5 Public review
  A.6 Appeal procedure
  A.7 Incorporation of the new cryptographic
      algorithm
  A.8 Maintenance
Annex B (informative) Example of a retail banking environment
  B.1 Introduction
Annex C (informative) Examples of threats in the retail banking
                      environment
  C.1 Introduction
  C.2 Threats
Annex D (informative) Bibliography

Covers the principles for the management of keys used in cipher systems implemented within the retail banking environment.

DocumentType
Standard
Pages
26
PublisherName
National Standards Authority of Ireland
Status
Withdrawn

ISO 11568-2:2012 Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
ISO 9807:1991 Banking and related financial services Requirements for message authentication (retail)
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO 9564-1:2017 Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems
ISO 9564-2:2014 Financial services — Personal Identification Number (PIN) management and security — Part 2: Approved algorithms for PIN encipherment
ISO 11568-3:1994 Banking Key management (retail) Part 3: Key life cycle for symmetric ciphers

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.