BS ISO 11568:2023
$215.11
Financial services. Key management (retail)
Published By | Publication Date | Number of Pages |
BSI | 2023 | 124 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
7 | Foreword |
8 | Introduction |
9 | 1 Scope 1.1 General 1.2 Scope exclusions 2 Normative references |
10 | 3 Terms and definitions |
20 | 4 Key management requirements 4.1 General 4.1.1 Key management strategy 4.1.2 Dual control and split knowledge of secret or private keys 4.1.3 Permissible key forms |
22 | 4.1.4 Logging 4.1.5 Cryptographic strength |
23 | 4.1.6 Key locations 4.1.7 Single-purpose key usage |
25 | 4.2 Secure cryptographic device 4.2.1 General requirements |
26 | 4.2.2 Additional SCD requirements for devices used in SKDAT |
27 | 4.3 Additional CA requirements 4.4 Additional RA requirements |
28 | 4.5 Key blocks 4.5.1 Overview of key blocks |
29 | 4.5.2 Key attributes 4.5.3 Integrity of the key block 4.5.4 Key and sensitive attributes field |
30 | 4.6 Key creation 4.6.1 Symmetric key creation |
31 | 4.6.2 Asymmetric key creation 4.7 Key component and key share creation |
32 | 4.8 Check values 4.8.1 Introduction 4.8.2 Symmetric key check value calculation |
33 | 4.8.3 Asymmetric key check value calculation 4.9 Key distribution 4.9.1 Symmetric key distribution |
36 | 4.9.2 SKDAT asymmetric key distribution |
38 | 4.10 Key loading 4.10.1 General |
39 | 4.10.2 Loading key components or shares 4.11 Key utilization 4.11.1 General key utilization requirements |
40 | 4.11.2 Additional key utilization requirements for SKDAT |
41 | 4.12 Key storage 4.12.1 Cleartext key component and share storage 4.12.2 Public key storage 4.13 Key replacement |
42 | 4.14 Key destruction 4.14.1 General |
43 | 4.14.2 Key destruction from an SCD 4.14.3 Destruction of a key in cryptogram form 4.14.4 Component and share destruction 4.15 Key backup |
44 | 4.16 Key archiving 4.17 Key compromise |
46 | 5 Transaction key management techniques 5.1 General 5.2 Method: master keys or transaction keys 5.3 Derived unique key per transaction 5.3.1 General |
47 | 5.3.2 DUKPT key management |
49 | 5.3.3 Unique initial keys |
50 | 5.3.4 AES DUKPT |
53 | 5.3.5 KSN compatibility mode |
54 | 5.3.6 Derived key OIDs 5.3.7 Keys and key sizes |
55 | 5.3.8 Helper functions and definitions |
56 | 5.3.9 Key derivation function algorithm |
57 | 5.3.10 Derivation data |
58 | 5.3.11 “Create Derivation Data” (local subroutine) |
59 | 5.3.12 Security considerations |
60 | 5.3.13 Host security module algorithm |
61 | 5.3.14 General 5.3.15 “Derive Initial Key” |
62 | 5.3.16 “Host Derive Working Key” 5.3.17 Intermediate derivation key derivation data examples |
63 | 5.3.18 Working key derivation data examples |
64 | 5.3.19 Transaction-originating device algorithm |
69 | 5.4 Host-to-host UKPT |
71 | Annex A (informative) Key and component check values |
75 | Annex B (normative) Split knowledge during transport |
77 | Annex C (informative) Trust models and key establishment |
85 | Annex D (informative) Symmetric key life cycle |
87 | Annex E (informative) Asymmetric key life cycle phases |
90 | Annex F (normative) Approved algorithms |
91 | Annex G (informative) AES DUKPT pseudocode notation |
94 | Annex H (informative) AES DUKPT test vectors |
95 | Annex I (informative) TDEA-derived unique key per transaction |
116 | Annex J (informative) Roles in payment environment |
119 | Annex K (informative) Roles in symmetric key distribution using asymmetric techniques |
122 | Bibliography |