{"id":346644,"date":"2024-10-20T00:22:08","date_gmt":"2024-10-20T00:22:08","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-11568-22012\/"},"modified":"2024-10-25T23:49:44","modified_gmt":"2024-10-25T23:49:44","slug":"bs-iso-11568-22012","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-11568-22012\/","title":{"rendered":"BS ISO 11568-2:2012"},"content":{"rendered":"
This part of ISO 11568 specifies techniques for the protection of symmetric and asymmetric cryptographic keys in a retail banking environment using symmetric ciphers and the life-cycle management of the associated symmetric keys. The techniques described enable compliance with the principles described in ISO 11568-1.<\/p>\n
The techniques described are applicable to any symmetric key management operation.<\/p>\n
The notation used in this part of ISO 11568 is given in Annex A.<\/p>\n
Algorithms approved for use with the techniques described in this part of ISO 11568 are given in Annex B.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1\tScope 2\tNormative references 3\tTerms and definitions <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4\tGeneral environment for key management techniques 4.1\tGeneral 4.2\tFunctionality of a secure cryptographic device <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4.3\tKey generation <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4.4\tKey calculation (variants) 4.5\tKey hierarchies <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4.6\tKey life cycle <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 4.7\tKey storage <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 4.8\tKey restoration from back-up 4.9\tKey distribution and loading <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 4.10\tKey use 4.11\tKey cryptoperiod <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 4.12\tKey replacement 4.13\tKey destruction 4.14\tKey deletion <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 4.15\tKey archive 4.16\tKey termination 5\tTechniques for the provision of key management services 5.1\tGeneral 5.2\tKey encipherment 5.3\tKey variants <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 5.4\tKey derivation 5.5\tKey transformation <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.6\tKey offsetting <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5.7\tKey notarization 5.8\tKey tagging <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 5.9\tKey verification 5.10\tKey identification <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 5.11\tControls and audit 5.12\tKey integrity <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 6\tSymmetric key life cycle 6.1\tGeneral 6.2\tKey generation 6.3\tKey storage <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 6.4\tKey restoration from back-up 6.5\tKey distribution and loading <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 6.6\tKey use 6.7\tKey replacement 6.8\tKey destruction, deletion, archive and termination <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 7\tKey management services cross-reference <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Annex\u00a0A \n(normative)<\/p>\n Notation used in this part of ISO\u00a011568 <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Annex\u00a0B \n(normative)<\/p>\n Approved algorithms for symmetric key management <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Annex\u00a0C \n(normative)<\/p>\n Abbreviations Abbreviations <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Bibliography Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Financial services. Key management (retail) – Symmetric ciphers, their key management and life cycle<\/b><\/p>\n |