ISO 11568-4:2007
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
Hardcopy , PDF
English
21-06-2007
09-04-2025
ISO 11568-4:2007 specifies techniques for the protection of symmetric and asymmetric cryptographic keys in a retail financial services environment using asymmetric cryptosystems and the life-cycle management of the associated asymmetric keys. The techniques described in this part of ISO 11568 enable compliance with the principles described in ISO 11568-1. For the purposes of this document, the retail financial services environment is restricted to the interface between:
- a card-accepting device and an acquirer;
- an acquirer and a card issuer;
- an ICC and a card-accepting device.
| Committee |
ISO/TC 68/SC 2
|
| DevelopmentNote |
Supersedes ISO/DIS 11568-4 and ISO 11568-5. (06/2007)
|
| DocumentType |
Standard
|
| Pages |
22
|
| PublisherName |
International Organization for Standardization
|
| Status |
Withdrawn
|
| SupersededBy | |
| Supersedes |
| Standards | Relationship |
| BIS IS 15256-4 : 2013 | Identical |
| NEN ISO 11568-4 : 2007 | Identical |
| BS ISO 11568-4:2007 | Identical |
| DS ISO 11568-4 : 2007 | Identical |
| AS 2805.6.1.4-2009 | Identical |
| PN ISO 11568-4 : 2009 | Identical |
| NF ISO 11568-4 : 1999 | Identical |
| 11/30231373 DC : 0 | BS ISO 11568-2 - FINANCIAL SERVICES - KEY MANAGEMENT (RETAIL) - PART 2: SYMMETRIC CIPHERS, THEIR KEY MANAGEMENT AND LIFE CYCLE |
| ISO 10202-7:1998 | Financial transaction cards — Security architecture of financial transaction systems using integrated circuit cards — Part 7: Key management |
| I.S. EN 62734:2015 | INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
| EN 62734:2015 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
| ISO 13491-2:2017 | Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions |
| 08/30192697 DC : 0 | BS ISO/IEC 9797-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER |
| BS ISO 11568-1:2005 | Banking. Key management (retail) Principles |
| ISO 13492:2007 | Financial services — Key management related data element — Application and usage of ISO 8583 data elements 53 and 96 |
| PD ISO/TR 14742:2010 | Financial services. Recommendations on cryptographic algorithms and their use |
| BS ISO 13491-2:2017 | Financial services. Secure cryptographic devices (retail) Security compliance checklists for devices used in financial transactions |
| ISO 11568-2:2012 | Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
| BS ISO 11568-5:1998 | Banking. Key management (retail) Key life cycle for public key cryptosystems |
| 14/30265615 DC : 0 | BS ISO 13491-1 - BANKING - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 1: CONCEPTS, REQUIREMENTS AND EVALUATION METHODS |
| BS ISO 13491-1:2007 | Banking. Secure cryptographic devices (retail) Concepts, requirements and evaluation methods |
| BS ISO 10202-7:1998 | Financial transaction cards. Security architecture of financial transaction systems using integrated circuit cards Key management |
| BS EN 62734:2015 | Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
| ANSI X9.112-1 : 2009 | WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
| ANSI X9.112 : 2016 | WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
| BS ISO 13492:2007 | Financial services. Key management related data element. Application and usage of ISO 8583 data elements 53 and 96 |
| ISO/TR 14742:2010 | Financial services — Recommendations on cryptographic algorithms and their use |
| ISO 11568-1:2005 | Banking — Key management (retail) — Part 1: Principles |
| IEC 62734:2014 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
| BS ISO 11568-2:2012 | Financial services. Key management (retail) Symmetric ciphers, their key management and life cycle |
| ISO 13491-1:2016 | Financial services — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods |
| 05/30144066 DC : DRAFT DEC 2005 | ISO 13492 - FINANCIAL SERVICES - KEY MANAGEMENT RELATED DATA ELEMENT - APPLICATION AND USAGE OF ISO 8353 DATA ELEMENTS 53 AND 96 |
| INCITS/ISO/IEC 9797-1 : 2011(R2019) | Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher |
| ANSI X9.84 : 2010(R2017) | BIOMETRIC INFORMATION MANAGEMENT AND SECURITY FOR THE FINANCIAL SERVICES INDUSTRY |
| ANSI X9.79-4 : 2013 | PUBLIC KEY INFRASTRUCTURE (PKI) - PART 4: ASYMMETRIC KEY MANAGEMENT |
| ANSI X9.79-1 : 2001 | FINANCIAL SERVICES PUBLIC KEY INFRASTRUCTURE - PART 1: PKI PRACTICES AND POLICY FRAMEWORK |
| ANSI X9.30.1 : 1997 | PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - PART 1: THE DIGITAL SIGNATURE ALGORITHM (DSA) |
| ISO 15782-1:2009 | Certificate management for financial services — Part 1: Public key certificates |
| ANSI X9.57 : 1997 | PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY: CERTIFICATE MANAGEMENT |
| AS ISO 13491.1:2019 | Financial services - Secure cryptographic devices (retail) Concepts, requirements and evaluation methods |
| ISO/IEC 18032:2005 | Information technology — Security techniques — Prime number generation |
| ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
| ISO 11568-2:2012 | Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
| ISO/IEC 11770-2:2008 | Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques |
| ISO 13491-2:2017 | Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions |
| ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
| ISO/IEC 18033-3:2010 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers |
| ISO/IEC 9796-3:2006 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms |
| ISO 13491-1:2016 | Financial services — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods |
| AS ISO 13491.2:2019 | Financial services - Secure cryptographic devices (retail) Security compliance checklists for devices used in financial transactions |
| ISO 16609:2012 | Financial services — Requirements for message authentication using symmetric techniques |
| ISO 9807:1991 | Banking and related financial services — Requirements for message authentication (retail) |
| ISO 9564-1:2017 | Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems |
| ISO 11568-1:2005 | Banking — Key management (retail) — Part 1: Principles |
| ISO/IEC 9796-2:2010 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms |
| ISO/IEC 9797-1:2011 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher |
| ISO/IEC 15946-3:2002 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 3: Key establishment |
| ISO 21188:2006 | Public key infrastructure for financial services — Practices and policy framework |
| AS ISO/IEC 9797.1:2019 | Information technology - Security techniques - Message Authentication Codes (MACs) Mechanisms using a block cipher |
| ISO/IEC 9797-2:2011 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function |
| AS 2805.5.3-2004 | Electronic funds transfer - Requirements for interfaces - Ciphers Data encipherment algorithm 2 (DEA 2) |
| ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
| ISO/IEC 11770-1:2010 | Information technology — Security techniques — Key management — Part 1: Framework |
| ANSI X9.42 : 2003(R2013) | PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES: AGREEMENT OF SYMMETRIC KEYS USING DISCRETE LOGARITHM CRYPTOGRAPHY |
| ISO/IEC 11770-3:2015 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.