
Banking - Key management (retail) Part 1: Principles
出版:International Organization for Standardization

专家解读视频
ISO 11568-1:2005 specifies the principles for the management of keys used in cryptosystems implemented within the retail-banking environment. The retail-banking environment includes the interface between a card accepting device and an acquirer, an acquirer and a card issuer, an ICC and a card-accepting device. An example of this environment and threats associated with the implementation of ISO 11568-1:2005 in the retail-banking environment are also described.ISO 11568-1:2005 is applicable both to the keys of symmetric cipher systems, where both originator and recipient use the same secret key(s), and to the private and public keys of asymmetric cryptosystems, unless otherwise stated. The procedure for the approval of cryptographic algorithms used for key management is specified.The use of ciphers often involves control information other than keys, e.g. initialization vectors and key identifiers. This other information is collectively called "keying material". Although ISO 11568-1:2005 specifically addresses the management of keys, the principles, services, and techniques applicable to keys may also be applicable to keying material.ISO 11568-1:2005 is appropriate for use by financial institutions and other organizations engaged in the area of retail financial services, where the interchange of information requires confidentiality, integrity, or authentication. Retail financial services include but are not limited to such processes as POS debit and credit authorizations, automated dispensing machine and ATM transactions, etc.ISO 9564 and ISO 16609 specify the use of cryptographic operations within retail financial transactions for personal identification number (PIN) encipherment and message authentication, respectively. The ISO 11568 series of standards is applicable to the management of the keys introduced by those standards. Additionally, the key management procedures may themselves require the introduction of further keys, e.g. key encipherment keys. The key management procedures are equally applicable to those key
I.S. EN ISO 11568-1:1997 - Identical
DS ISO 11568-1 : 2007 - Identical
NF ISO 11568-1 : 1994 - Identical
AS 2805.6.1.1-2009 (R2019) - Identical
NEN ISO 11568-1 : 2005 - Identical
DIN EN ISO 11568-1 : 1996 - Identical
BS ISO 11568-1 : 2005 - Identical
BS EN ISO 11568-1 : 1996 - Identical
BS ISO 11568-1 : 2005 - Identical
NEN ISO 11568-1 : 2005 - Identical
NBN EN ISO 11568-1 : 1996 - Identical
DS ISO 11568-1 : 2007 - Identical
BS EN ISO 11568-1:1996 - Identical
AS 2805.6.1.1-2009 - Identical
UNE EN ISO 11568-1:1996 - Identical
SS EN ISO 11568-1 Ed. 1 (1996) - Identical
NS EN ISO 11568-1 Ed. 1 (1996) - Identical
NF EN ISO 11568-1:1996 - Identical
GB/T 27909.1-2011 - Modified
SS ISO 11568-1 Ed. 1 (1995) - Identical
I.S. EN ISO 11568-1:1997 - Identical
DIN EN ISO 11568-1 (1996-11) - Identical
SNV BS EN ISO 11568-1:1996 - Identical
NEN EN ISO 11568-1:1996 - Identical
BS ISO 11568-1:2005 - Identical
NBN EN ISO 11568-1:1996 - Identical
NEN ISO 11568-1:2005 - Identical