Shopping Cart

No products in the cart.

BS ISO 11568-2:2012

$167.15

Financial services. Key management (retail) – Symmetric ciphers, their key management and life cycle

Published By Publication Date Number of Pages
BSI 2012 40
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This part of ISO 11568 specifies techniques for the protection of symmetric and asymmetric cryptographic keys in a retail banking environment using symmetric ciphers and the life-cycle management of the associated symmetric keys. The techniques described enable compliance with the principles described in ISO 11568-1.

The techniques described are applicable to any symmetric key management operation.

The notation used in this part of ISO 11568 is given in Annex A.

Algorithms approved for use with the techniques described in this part of ISO 11568 are given in Annex B.

PDF Catalog

PDF Pages PDF Title
6 Foreword
7 Introduction
9 1 Scope
2 Normative references
3 Terms and definitions
12 4 General environment for key management techniques
4.1 General
4.2 Functionality of a secure cryptographic device
13 4.3 Key generation
14 4.4 Key calculation (variants)
4.5 Key hierarchies
15 4.6 Key life cycle
17 4.7 Key storage
18 4.8 Key restoration from back-up
4.9 Key distribution and loading
19 4.10 Key use
4.11 Key cryptoperiod
20 4.12 Key replacement
4.13 Key destruction
4.14 Key deletion
21 4.15 Key archive
4.16 Key termination
5 Techniques for the provision of key management services
5.1 General
5.2 Key encipherment
5.3 Key variants
22 5.4 Key derivation
5.5 Key transformation
23 5.6 Key offsetting
24 5.7 Key notarization
5.8 Key tagging
26 5.9 Key verification
5.10 Key identification
27 5.11 Controls and audit
5.12 Key integrity
28 6 Symmetric key life cycle
6.1 General
6.2 Key generation
6.3 Key storage
29 6.4 Key restoration from back-up
6.5 Key distribution and loading
31 6.6 Key use
6.7 Key replacement
6.8 Key destruction, deletion, archive and termination
32 7 Key management services cross-reference
34 Annex A
(normative)

Notation used in this part of ISO 11568

35 Annex B
(normative)

Approved algorithms for symmetric key management

36 Annex C
(normative)

Abbreviations
Annex C
(normative)

Abbreviations

37 Bibliography
Bibliography
BS ISO 11568-2:2012
$167.15