BS ISO 11568-2:2012
$167.15
Financial services. Key management (retail) – Symmetric ciphers, their key management and life cycle
Published By | Publication Date | Number of Pages |
BSI | 2012 | 40 |
This part of ISO 11568 specifies techniques for the protection of symmetric and asymmetric cryptographic keys in a retail banking environment using symmetric ciphers and the life-cycle management of the associated symmetric keys. The techniques described enable compliance with the principles described in ISO 11568-1.
The techniques described are applicable to any symmetric key management operation.
The notation used in this part of ISO 11568 is given in Annex A.
Algorithms approved for use with the techniques described in this part of ISO 11568 are given in Annex B.
PDF Catalog
PDF Pages | PDF Title |
---|---|
6 | Foreword |
7 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
12 | 4 General environment for key management techniques 4.1 General 4.2 Functionality of a secure cryptographic device |
13 | 4.3 Key generation |
14 | 4.4 Key calculation (variants) 4.5 Key hierarchies |
15 | 4.6 Key life cycle |
17 | 4.7 Key storage |
18 | 4.8 Key restoration from back-up 4.9 Key distribution and loading |
19 | 4.10 Key use 4.11 Key cryptoperiod |
20 | 4.12 Key replacement 4.13 Key destruction 4.14 Key deletion |
21 | 4.15 Key archive 4.16 Key termination 5 Techniques for the provision of key management services 5.1 General 5.2 Key encipherment 5.3 Key variants |
22 | 5.4 Key derivation 5.5 Key transformation |
23 | 5.6 Key offsetting |
24 | 5.7 Key notarization 5.8 Key tagging |
26 | 5.9 Key verification 5.10 Key identification |
27 | 5.11 Controls and audit 5.12 Key integrity |
28 | 6 Symmetric key life cycle 6.1 General 6.2 Key generation 6.3 Key storage |
29 | 6.4 Key restoration from back-up 6.5 Key distribution and loading |
31 | 6.6 Key use 6.7 Key replacement 6.8 Key destruction, deletion, archive and termination |
32 | 7 Key management services cross-reference |
34 | Annex A (normative) Notation used in this part of ISO 11568 |
35 | Annex B (normative) Approved algorithms for symmetric key management |
36 | Annex C (normative) Abbreviations Abbreviations |
37 | Bibliography Bibliography |