1 Scope
2 Normative references
3 Definitions
4 General environment for key management techniques
4.1 Functionality of a secure cryptographic device
4.2 Double length keys
4.3 Key generation
4.4 Key calculation
4.5 Key hierarchies
5 Techniques for the provision of key management
services
5.1 Key encipherment
5.2 Key variants
5.3 Key derivation
5.4 Key transformation
5.5 Key offsetting
5.6 Key notarization
5.7 Key tagging
5.8 Key verification
5.9 Key identification
5.10 Controls and audit
6 Key management services cross reference
Annex A (normative) Notation used in this part of ISO 11568
A.1 Operators
A.2 Suffix letters for keys
A.3 Specific keys and key pairs
Annex B (normative) Approved algorithms for symmetric key
management
Annex C (normative) Abbreviations
Annex D (informative) Symmetric cipher examples
Annex E (informative) Key variants and control vectors
E.1 Key variants
E.2 Control vectors
Annex F (informative) Bibliography