{"id":424957,"date":"2024-10-20T06:54:17","date_gmt":"2024-10-20T06:54:17","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-115682023\/"},"modified":"2024-10-26T13:00:04","modified_gmt":"2024-10-26T13:00:04","slug":"bs-iso-115682023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-115682023\/","title":{"rendered":"BS ISO 11568:2023"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
7<\/td>\nForeword <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
1.1 General
1.2 Scope exclusions
2 Normative references <\/td>\n<\/tr>\n
10<\/td>\n3 Terms and definitions <\/td>\n<\/tr>\n
20<\/td>\n4 Key management requirements
4.1 General
4.1.1 Key management strategy
4.1.2 Dual control and split knowledge of secret or private keys
4.1.3 Permissible key forms <\/td>\n<\/tr>\n
22<\/td>\n4.1.4 Logging
4.1.5 Cryptographic strength <\/td>\n<\/tr>\n
23<\/td>\n4.1.6 Key locations
4.1.7 Single-purpose key usage <\/td>\n<\/tr>\n
25<\/td>\n4.2 Secure cryptographic device
4.2.1 General requirements <\/td>\n<\/tr>\n
26<\/td>\n4.2.2 Additional SCD requirements for devices used in SKDAT <\/td>\n<\/tr>\n
27<\/td>\n4.3 Additional CA requirements
4.4 Additional RA requirements <\/td>\n<\/tr>\n
28<\/td>\n4.5 Key blocks
4.5.1 Overview of key blocks <\/td>\n<\/tr>\n
29<\/td>\n4.5.2 Key attributes
4.5.3 Integrity of the key block
4.5.4 Key and sensitive attributes field <\/td>\n<\/tr>\n
30<\/td>\n4.6 Key creation
4.6.1 Symmetric key creation <\/td>\n<\/tr>\n
31<\/td>\n4.6.2 Asymmetric key creation
4.7 Key component and key share creation <\/td>\n<\/tr>\n
32<\/td>\n4.8 Check values
4.8.1 Introduction
4.8.2 Symmetric key check value calculation <\/td>\n<\/tr>\n
33<\/td>\n4.8.3 Asymmetric key check value calculation
4.9 Key distribution
4.9.1 Symmetric key distribution <\/td>\n<\/tr>\n
36<\/td>\n4.9.2 SKDAT asymmetric key distribution <\/td>\n<\/tr>\n
38<\/td>\n4.10 Key loading
4.10.1 General <\/td>\n<\/tr>\n
39<\/td>\n4.10.2 Loading key components or shares
4.11 Key utilization
4.11.1 General key utilization requirements <\/td>\n<\/tr>\n
40<\/td>\n4.11.2 Additional key utilization requirements for SKDAT <\/td>\n<\/tr>\n
41<\/td>\n4.12 Key storage
4.12.1 Cleartext key component and share storage
4.12.2 Public key storage
4.13 Key replacement <\/td>\n<\/tr>\n
42<\/td>\n4.14 Key destruction
4.14.1 General <\/td>\n<\/tr>\n
43<\/td>\n4.14.2 Key destruction from an SCD
4.14.3 Destruction of a key in cryptogram form
4.14.4 Component and share destruction
4.15 Key backup <\/td>\n<\/tr>\n
44<\/td>\n4.16 Key archiving
4.17 Key compromise <\/td>\n<\/tr>\n
46<\/td>\n5 Transaction key management techniques
5.1 General
5.2 Method: master keys or transaction keys
5.3 Derived unique key per transaction
5.3.1 General <\/td>\n<\/tr>\n
47<\/td>\n5.3.2 DUKPT key management <\/td>\n<\/tr>\n
49<\/td>\n5.3.3 Unique initial keys <\/td>\n<\/tr>\n
50<\/td>\n5.3.4 AES DUKPT <\/td>\n<\/tr>\n
53<\/td>\n5.3.5 KSN compatibility mode <\/td>\n<\/tr>\n
54<\/td>\n5.3.6 Derived key OIDs
5.3.7 Keys and key sizes <\/td>\n<\/tr>\n
55<\/td>\n5.3.8 Helper functions and definitions <\/td>\n<\/tr>\n
56<\/td>\n5.3.9 Key derivation function algorithm <\/td>\n<\/tr>\n
57<\/td>\n5.3.10 Derivation data <\/td>\n<\/tr>\n
58<\/td>\n5.3.11 \u201cCreate Derivation Data\u201d (local subroutine) <\/td>\n<\/tr>\n
59<\/td>\n5.3.12 Security considerations <\/td>\n<\/tr>\n
60<\/td>\n5.3.13 Host security module algorithm <\/td>\n<\/tr>\n
61<\/td>\n5.3.14 General
5.3.15 “Derive Initial Key” <\/td>\n<\/tr>\n
62<\/td>\n5.3.16 “Host Derive Working Key”
5.3.17 Intermediate derivation key derivation data examples <\/td>\n<\/tr>\n
63<\/td>\n5.3.18 Working key derivation data examples <\/td>\n<\/tr>\n
64<\/td>\n5.3.19 Transaction-originating device algorithm <\/td>\n<\/tr>\n
69<\/td>\n5.4 Host-to-host UKPT <\/td>\n<\/tr>\n
71<\/td>\nAnnex A (informative) Key and component check values <\/td>\n<\/tr>\n
75<\/td>\nAnnex B (normative) Split knowledge during transport <\/td>\n<\/tr>\n
77<\/td>\nAnnex C (informative) Trust models and key establishment <\/td>\n<\/tr>\n
85<\/td>\nAnnex D (informative) Symmetric key life cycle <\/td>\n<\/tr>\n
87<\/td>\nAnnex E (informative) Asymmetric key life cycle phases <\/td>\n<\/tr>\n
90<\/td>\nAnnex F (normative) Approved algorithms <\/td>\n<\/tr>\n
91<\/td>\nAnnex G (informative) AES DUKPT pseudocode notation <\/td>\n<\/tr>\n
94<\/td>\nAnnex H (informative) AES DUKPT test vectors <\/td>\n<\/tr>\n
95<\/td>\nAnnex I (informative) TDEA-derived unique key per transaction <\/td>\n<\/tr>\n
116<\/td>\nAnnex J (informative) Roles in payment environment <\/td>\n<\/tr>\n
119<\/td>\nAnnex K (informative) Roles in symmetric key distribution using asymmetric techniques <\/td>\n<\/tr>\n
122<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Financial services. Key management (retail)<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2023<\/td>\n124<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":424966,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[696,2641],"product_tag":[],"class_list":{"0":"post-424957","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-240-40","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/424957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/424966"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=424957"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=424957"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=424957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}