ISO 11568-4:2007
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
17-02-2023
English
21-06-2007
ISO 11568-4:2007 specifies techniques for the protection of symmetric and asymmetric cryptographic keys in a retail financial services environment using asymmetric cryptosystems and the life-cycle management of the associated asymmetric keys. The techniques described in this part of ISO 11568 enable compliance with the principles described in ISO 11568-1. For the purposes of this document, the retail financial services environment is restricted to the interface between:
- a card-accepting device and an acquirer;
- an acquirer and a card issuer;
- an ICC and a card-accepting device.
DevelopmentNote |
Supersedes ISO/DIS 11568-4 and ISO 11568-5. (06/2007)
|
DocumentType |
Standard
|
Pages |
22
|
PublisherName |
International Organization for Standardization
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
Standards | Relationship |
BIS IS 15256-4 : 2013 | Identical |
NEN ISO 11568-4 : 2007 | Identical |
BS ISO 11568-4:2007 | Identical |
DS ISO 11568-4 : 2007 | Identical |
AS 2805.6.1.4-2009 | Identical |
PN ISO 11568-4 : 2009 | Identical |
NF ISO 11568-4 : 1999 | Identical |
11/30231373 DC : 0 | BS ISO 11568-2 - FINANCIAL SERVICES - KEY MANAGEMENT (RETAIL) - PART 2: SYMMETRIC CIPHERS, THEIR KEY MANAGEMENT AND LIFE CYCLE |
ISO 10202-7:1998 | Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 7: Key management |
I.S. EN 62734:2015 | INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
EN 62734:2015 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
ISO 13491-2:2017 | Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions |
08/30192697 DC : 0 | BS ISO/IEC 9797-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER |
BS ISO 11568-1:2005 | Banking. Key management (retail) Principles |
ISO 13492:2007 | Financial services Key management related data element Application and usage of ISO 8583 data elements 53 and 96 |
PD ISO/TR 14742:2010 | Financial services. Recommendations on cryptographic algorithms and their use |
BS ISO 13491-2:2017 | Financial services. Secure cryptographic devices (retail) Security compliance checklists for devices used in financial transactions |
ETR 237 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS |
ISO 11568-2:2012 | Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
BS ISO 11568-5:1998 | Banking. Key management (retail) Key life cycle for public key cryptosystems |
14/30265615 DC : 0 | BS ISO 13491-1 - BANKING - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 1: CONCEPTS, REQUIREMENTS AND EVALUATION METHODS |
BS ISO 13491-1:2007 | Banking. Secure cryptographic devices (retail) Concepts, requirements and evaluation methods |
BS ISO 10202-7:1998 | Financial transaction cards. Security architecture of financial transaction systems using integrated circuit cards Key management |
BS EN 62734:2015 | Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
ANSI X9.112-1 : 2009 | WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
ANSI X9.112 : 2016 | WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
BS ISO 13492:2007 | Financial services. Key management related data element. Application and usage of ISO 8583 data elements 53 and 96 |
ISO/TR 14742:2010 | Financial services Recommendations on cryptographic algorithms and their use |
ISO 11568-1:2005 | Banking — Key management (retail) — Part 1: Principles |
IEC 62734:2014 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
BS ISO 11568-2:2012 | Financial services. Key management (retail) Symmetric ciphers, their key management and life cycle |
ISO 13491-1:2016 | Financial services — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods |
05/30144066 DC : DRAFT DEC 2005 | ISO 13492 - FINANCIAL SERVICES - KEY MANAGEMENT RELATED DATA ELEMENT - APPLICATION AND USAGE OF ISO 8353 DATA ELEMENTS 53 AND 96 |
ANSI X9.84 : 2010(R2017) | BIOMETRIC INFORMATION MANAGEMENT AND SECURITY FOR THE FINANCIAL SERVICES INDUSTRY |
ANSI X9.79-4 : 2013 | PUBLIC KEY INFRASTRUCTURE (PKI) - PART 4: ASYMMETRIC KEY MANAGEMENT |
ANSI X9.79-1 : 2001 | FINANCIAL SERVICES PUBLIC KEY INFRASTRUCTURE - PART 1: PKI PRACTICES AND POLICY FRAMEWORK |
ANSI X9.30.1 : 1997 | PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - PART 1: THE DIGITAL SIGNATURE ALGORITHM (DSA) |
ISO 15782-1:2009 | Certificate management for financial services Part 1: Public key certificates |
ANSI X9.57 : 1997 | PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY: CERTIFICATE MANAGEMENT |
AS ISO 13491.1:2019 | Financial services - Secure cryptographic devices (retail) Concepts, requirements and evaluation methods |
ISO/IEC 18032:2005 | Information technology Security techniques Prime number generation |
ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
ISO 11568-2:2012 | Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
ISO 13491-2:2017 | Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO/IEC 9796-3:2006 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms |
ISO 13491-1:2016 | Financial services — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods |
AS ISO 13491.2:2019 | Financial services - Secure cryptographic devices (retail) Security compliance checklists for devices used in financial transactions |
ISO 16609:2012 | Financial services — Requirements for message authentication using symmetric techniques |
ISO 9807:1991 | Banking and related financial services Requirements for message authentication (retail) |
ISO 9564-1:2017 | Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems |
ISO 11568-1:2005 | Banking — Key management (retail) — Part 1: Principles |
ISO/IEC 9796-2:2010 | Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 15946-3:2002 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 3: Key establishment |
ISO 21188:2006 | Public key infrastructure for financial services Practices and policy framework |
AS ISO/IEC 9797.1:2019 | Information technology - Security techniques - Message Authentication Codes (MACs) Mechanisms using a block cipher |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
AS 2805.5.3-2004 | Electronic funds transfer - Requirements for interfaces - Ciphers Data encipherment algorithm 2 (DEA 2) |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
ANSI X9.42 : 2003(R2013) | PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES: AGREEMENT OF SYMMETRIC KEYS USING DISCRETE LOGARITHM CRYPTOGRAPHY |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.