{"id":424957,"date":"2024-10-20T06:54:17","date_gmt":"2024-10-20T06:54:17","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-115682023\/"},"modified":"2024-10-26T13:00:04","modified_gmt":"2024-10-26T13:00:04","slug":"bs-iso-115682023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-115682023\/","title":{"rendered":"BS ISO 11568:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 1.1 General 1.2 Scope exclusions 2 Normative references <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 4 Key management requirements 4.1 General 4.1.1 Key management strategy 4.1.2 Dual control and split knowledge of secret or private keys 4.1.3 Permissible key forms <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 4.1.4 Logging 4.1.5 Cryptographic strength <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 4.1.6 Key locations 4.1.7 Single-purpose key usage <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 4.2 Secure cryptographic device 4.2.1 General requirements <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 4.2.2 Additional SCD requirements for devices used in SKDAT <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 4.3 Additional CA requirements 4.4 Additional RA requirements <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 4.5 Key blocks 4.5.1 Overview of key blocks <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 4.5.2 Key attributes 4.5.3 Integrity of the key block 4.5.4 Key and sensitive attributes field <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 4.6 Key creation 4.6.1 Symmetric key creation <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 4.6.2 Asymmetric key creation 4.7 Key component and key share creation <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 4.8 Check values 4.8.1 Introduction 4.8.2 Symmetric key check value calculation <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 4.8.3 Asymmetric key check value calculation 4.9 Key distribution 4.9.1 Symmetric key distribution <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 4.9.2 SKDAT asymmetric key distribution <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 4.10 Key loading 4.10.1 General <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 4.10.2 Loading key components or shares 4.11 Key utilization 4.11.1 General key utilization requirements <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 4.11.2 Additional key utilization requirements for SKDAT <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 4.12 Key storage 4.12.1 Cleartext key component and share storage 4.12.2 Public key storage 4.13 Key replacement <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 4.14 Key destruction 4.14.1 General <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 4.14.2 Key destruction from an SCD 4.14.3 Destruction of a key in cryptogram form 4.14.4 Component and share destruction 4.15 Key backup <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 4.16 Key archiving 4.17 Key compromise <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 5 Transaction key management techniques 5.1 General 5.2 Method: master keys or transaction keys 5.3 Derived unique key per transaction 5.3.1 General <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 5.3.2 DUKPT key management <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 5.3.3 Unique initial keys <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 5.3.4 AES DUKPT <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 5.3.5 KSN compatibility mode <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 5.3.6 Derived key OIDs 5.3.7 Keys and key sizes <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 5.3.8 Helper functions and definitions <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 5.3.9 Key derivation function algorithm <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 5.3.10 Derivation data <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 5.3.11 \u201cCreate Derivation Data\u201d (local subroutine) <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 5.3.12 Security considerations <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | 5.3.13 Host security module algorithm <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 5.3.14 General 5.3.15 “Derive Initial Key” <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 5.3.16 “Host Derive Working Key” 5.3.17 Intermediate derivation key derivation data examples <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 5.3.18 Working key derivation data examples <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 5.3.19 Transaction-originating device algorithm <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | 5.4 Host-to-host UKPT <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | Annex A (informative) Key and component check values <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | Annex B (normative) Split knowledge during transport <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | Annex C (informative) Trust models and key establishment <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | Annex D (informative) Symmetric key life cycle <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | Annex E (informative) Asymmetric key life cycle phases <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | Annex F (normative) Approved algorithms <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | Annex G (informative) AES DUKPT pseudocode notation <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | Annex H (informative) AES DUKPT test vectors <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | Annex I (informative) TDEA-derived unique key per transaction <\/td>\n<\/tr>\n | ||||||
116<\/td>\n | Annex J (informative) Roles in payment environment <\/td>\n<\/tr>\n | ||||||
119<\/td>\n | Annex K (informative) Roles in symmetric key distribution using asymmetric techniques <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Financial services. Key management (retail)<\/b><\/p>\n |