{"id":346644,"date":"2024-10-20T00:22:08","date_gmt":"2024-10-20T00:22:08","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-11568-22012\/"},"modified":"2024-10-25T23:49:44","modified_gmt":"2024-10-25T23:49:44","slug":"bs-iso-11568-22012","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-11568-22012\/","title":{"rendered":"BS ISO 11568-2:2012"},"content":{"rendered":"

This part of ISO 11568 specifies techniques for the protection of symmetric and asymmetric cryptographic keys in a retail banking environment using symmetric ciphers and the life-cycle management of the associated symmetric keys. The techniques described enable compliance with the principles described in ISO 11568-1.<\/p>\n

The techniques described are applicable to any symmetric key management operation.<\/p>\n

The notation used in this part of ISO 11568 is given in Annex A.<\/p>\n

Algorithms approved for use with the techniques described in this part of ISO 11568 are given in Annex B.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1\tScope
2\tNormative references
3\tTerms and definitions <\/td>\n<\/tr>\n
12<\/td>\n4\tGeneral environment for key management techniques
4.1\tGeneral
4.2\tFunctionality of a secure cryptographic device <\/td>\n<\/tr>\n
13<\/td>\n4.3\tKey generation <\/td>\n<\/tr>\n
14<\/td>\n4.4\tKey calculation (variants)
4.5\tKey hierarchies <\/td>\n<\/tr>\n
15<\/td>\n4.6\tKey life cycle <\/td>\n<\/tr>\n
17<\/td>\n4.7\tKey storage <\/td>\n<\/tr>\n
18<\/td>\n4.8\tKey restoration from back-up
4.9\tKey distribution and loading <\/td>\n<\/tr>\n
19<\/td>\n4.10\tKey use
4.11\tKey cryptoperiod <\/td>\n<\/tr>\n
20<\/td>\n4.12\tKey replacement
4.13\tKey destruction
4.14\tKey deletion <\/td>\n<\/tr>\n
21<\/td>\n4.15\tKey archive
4.16\tKey termination
5\tTechniques for the provision of key management services
5.1\tGeneral
5.2\tKey encipherment
5.3\tKey variants <\/td>\n<\/tr>\n
22<\/td>\n5.4\tKey derivation
5.5\tKey transformation <\/td>\n<\/tr>\n
23<\/td>\n5.6\tKey offsetting <\/td>\n<\/tr>\n
24<\/td>\n5.7\tKey notarization
5.8\tKey tagging <\/td>\n<\/tr>\n
26<\/td>\n5.9\tKey verification
5.10\tKey identification <\/td>\n<\/tr>\n
27<\/td>\n5.11\tControls and audit
5.12\tKey integrity <\/td>\n<\/tr>\n
28<\/td>\n6\tSymmetric key life cycle
6.1\tGeneral
6.2\tKey generation
6.3\tKey storage <\/td>\n<\/tr>\n
29<\/td>\n6.4\tKey restoration from back-up
6.5\tKey distribution and loading <\/td>\n<\/tr>\n
31<\/td>\n6.6\tKey use
6.7\tKey replacement
6.8\tKey destruction, deletion, archive and termination <\/td>\n<\/tr>\n
32<\/td>\n7\tKey management services cross-reference <\/td>\n<\/tr>\n
34<\/td>\nAnnex\u00a0A
\n(normative)<\/p>\n

Notation used in this part of ISO\u00a011568 <\/td>\n<\/tr>\n

35<\/td>\nAnnex\u00a0B
\n(normative)<\/p>\n

Approved algorithms for symmetric key management <\/td>\n<\/tr>\n

36<\/td>\nAnnex\u00a0C
\n(normative)<\/p>\n

Abbreviations
Annex\u00a0C
\n(normative)<\/p>\n

Abbreviations <\/td>\n<\/tr>\n

37<\/td>\nBibliography
Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Financial services. Key management (retail) – Symmetric ciphers, their key management and life cycle<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2012<\/td>\n40<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":346649,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[696,2641],"product_tag":[],"class_list":{"0":"post-346644","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-240-40","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/346644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/346649"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=346644"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=346644"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=346644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}