BS ISO 11568-2-2012 Financial services Key management (retail) Symmetric ciphers their key management and life cycle《金融服务 密钥管理(零售) 对称加密及其密钥管理和使用周期》.pdf

上传人:inwarn120 文档编号:583615 上传时间:2018-12-15 格式:PDF 页数:40 大小:1.25MB
下载 相关 举报
BS ISO 11568-2-2012 Financial services Key management (retail) Symmetric ciphers their key management and life cycle《金融服务 密钥管理(零售) 对称加密及其密钥管理和使用周期》.pdf_第1页
第1页 / 共40页
BS ISO 11568-2-2012 Financial services Key management (retail) Symmetric ciphers their key management and life cycle《金融服务 密钥管理(零售) 对称加密及其密钥管理和使用周期》.pdf_第2页
第2页 / 共40页
BS ISO 11568-2-2012 Financial services Key management (retail) Symmetric ciphers their key management and life cycle《金融服务 密钥管理(零售) 对称加密及其密钥管理和使用周期》.pdf_第3页
第3页 / 共40页
BS ISO 11568-2-2012 Financial services Key management (retail) Symmetric ciphers their key management and life cycle《金融服务 密钥管理(零售) 对称加密及其密钥管理和使用周期》.pdf_第4页
第4页 / 共40页
BS ISO 11568-2-2012 Financial services Key management (retail) Symmetric ciphers their key management and life cycle《金融服务 密钥管理(零售) 对称加密及其密钥管理和使用周期》.pdf_第5页
第5页 / 共40页
亲,该文档总共40页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、raising standards worldwideNO COPYING WITHOUT BSI PERMISSION EXCEPT AS PERMITTED BY COPYRIGHT LAWBSI Standards PublicationBS ISO 11568-2:2012Financial services Keymanagement (retail)Part 2: Symmetric ciphers, their keymanagement and life cycleBS ISO 11568-2:2012 BRITISH STANDARDNational forewordThis

2、 British Standard is the UK implementation of ISO 11568-2:2012.It supersedes BS ISO 11568-2:2005 which is withdrawn.The UK participation in its preparation was entrusted to TechnicalCommittee IST/12, Financial services.A list of organizations represented on this committee can beobtained on request t

3、o its secretary.This publication does not purport to include all the necessaryprovisions of a contract. Users are responsible for its correctapplication. The British Standards Institution 2012. Published by BSI StandardsLimited 2012ISBN 978 0 580 72167 0ICS 35.240.40Compliance with a British Standar

4、d cannot confer immunity fromlegal obligations.This British Standard was published under the authority of theStandards Policy and Strategy Committee on 31 March 2012.Amendments issued since publicationDate Text affectedBS ISO 11568-2:2012 ISO 2012Financial services Key management (retail) Part 2: Sy

5、mmetric ciphers, their key management and life cycleServices financiers Gestion de cls (services aux particuliers) Partie 2: Algorithmes cryptographiques symtriques, leur gestion de cls et leur cycle de vieINTERNATIONAL STANDARDISO11568-2Third edition2012-02-01Reference numberISO 11568-2:2012(E)BS I

6、SO 11568-2:2012ISO 11568-2:2012(E)ii ISO 2012 All rights reservedCOPYRIGHT PROTECTED DOCUMENT ISO 2012All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm

7、, without permission in writing from either ISO at the address below or ISOs member body in the country of the requester.ISO copyright officeCase postale 56 CH-1211 Geneva 20Tel. + 41 22 749 01 11Fax + 41 22 749 09 47E-mail copyrightiso.orgWeb www.iso.orgPublished in SwitzerlandBS ISO 11568-2:2012IS

8、O 11568-2:2012(E) ISO 2012 All rights reserved iiiContents PageForeword ivIntroduction v1 Scope 12 Normative references . 13 Terms and definitions . 14 General environment for key management techniques 44.1 General . 44.2 Functionality of a secure cryptographic device . 44.3 Key generation . 54.4 Ke

9、y calculation (variants) . 64.5 Key hierarchies 64.6 Key life cycle . 74.7 Key storage . 94.8 Key restoration from back-up 104.9 Key distribution and loading 104.10 Key use . 114.11 Key cryptoperiod . 114.12 Key replacement 124.13 Key destruction 124.14 Key deletion 124.15 Key archive .134.16 Key te

10、rmination 135 Techniques for the provision of key management services 135.1 General .135.2 Key encipherment .135.3 Key variants 135.4 Key derivation 145.5 Key transformation .145.6 Key offsetting .155.7 Key notarization .165.8 Key tagging .165.9 Key verification 185.10 Key identification .185.11 Con

11、trols and audit .195.12 Key integrity 196 Symmetric key life cycle 206.1 General .206.2 Key generation .206.3 Key storage .206.4 Key restoration from back-up 216.5 Key distribution and loading 216.6 Key use .236.7 Key replacement 236.8 Key destruction, deletion, archive and termination .237 Key mana

12、gement services cross-reference .24Annex A (normative) Notation used in this part of ISO 11568 26Annex B (normative) Approved algorithms for symmetric key management 27Annex C (normative) Abbreviations 28Bibliography .29BS ISO 11568-2:2012ISO 11568-2:2012(E)ForewordISO (the International Organizatio

13、n for Standardization) is a worldwide federation of national standards bodies (ISO member bodies). The work of preparing International Standards is normally carried out through ISO technical committees. Each member body interested in a subject for which a technical committee has been established has

14、 the right to be represented on that committee. International organizations, governmental and non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization.Intern

15、ational Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.The main task of technical committees is to prepare International Standards. Draft International Standards adopted by the technical committees are circulated to the member bodies for voting. Publicatio

16、n as an International Standard requires approval by at least 75 % of the member bodies casting a vote.Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO shall not be held responsible for identifying any or all such patent rights.

17、ISO 11568-2 was prepared by Technical Committee ISO/TC 68, Financial services, Subcommittee SC 2, Financial Services, security.This third edition cancels and replaces the second edition (ISO 11568-2:2005), which has been technically revised.ISO 11568 consists of the following parts, under the genera

18、l title Financial services Key management (retail) : Part 1: Principles Part 2: Symmetric ciphers, their key management and life cycle Part 4: Asymmetric cryptosystems Key management and life cycleiv ISO 2012 All rights reservedBS ISO 11568-2:2012ISO 11568-2:2012(E)IntroductionISO 11568 is one of a

19、series of standards describing procedures for the secure management of cryptographic keys used to protect messages in a retail financial services environment, for instance, messages between an acquirer and a card acceptor, or an acquirer and a card issuer.This part of ISO 11568 addresses the key man

20、agement requirements that are applicable in the domain of retail financial services. Typical of such services are point-of-sale/point-of-service (POS) debit and credit authorizations and automated teller machine (ATM) transactions.This part of ISO 11568 describes key management techniques which, whe

21、n used in combination, provide the key management services identified in ISO 11568-1. These services are: key separation; key substitution prevention; key identification; key synchronization; key integrity; key confidentiality; key compromise detection.The key management services and corresponding k

22、ey management techniques are cross-referenced in Clause 7.This part of ISO 11568 also describes the key life cycle in the context of secure management of cryptographic keys for symmetric ciphers. It states both requirements and implementation methods for each step in the life of such a key, utilizin

23、g the key management principles, services and techniques described herein and in ISO 11568-1. This part of ISO 11568 does not cover the management or key life cycle for keys used in asymmetric ciphers, which are covered in ISO 11568-4.In the development of ISO 11568, due consideration was given to I

24、SO/IEC 11770; the mechanisms adopted and described in this part of ISO 11568 are those required to satisfy the needs of the financial services industry. ISO 2012 All rights reserved vBS ISO 11568-2:2012BS ISO 11568-2:2012Financial services Key management (retail) Part 2: Symmetric ciphers, their key

25、 management and life cycle1 ScopeThis part of ISO 11568 specifies techniques for the protection of symmetric and asymmetric cryptographic keys in a retail banking environment using symmetric ciphers and the life-cycle management of the associated symmetric keys. The techniques described enable compl

26、iance with the principles described in ISO 11568-1.The techniques described are applicable to any symmetric key management operation. The notation used in this part of ISO 11568 is given in Annex A.Algorithms approved for use with the techniques described in this part of ISO 11568 are given in Annex

27、 B.2 Normative referencesThe following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.ISO 9564-1, Financial ser

28、vices Personal Identification Number (PIN) management and security Part 1: Basic principles and requirements for PINs in card-based systemsISO/IEC 10116, Information technology Security techniques Modes of operation for an n-bit block cipherISO 11568-1:2005, Banking Key management (retail) Part 1: P

29、rinciplesISO 11568-4, Banking Key management (retail) Part 4: Asymmetric cryptosystems Key management and life cycleISO 13491-1, Banking Secure cryptographic devices (retail) Part 1: Concepts, requirements and evaluation methodsISO 13491-2:2005, Banking Secure cryptographic devices (retail) Part 2:

30、Security compliance checklists for devices used in financial transactionsISO 16609, Financial services Requirements for message authentication using symmetric techniquesISO/IEC 18033-3, Information technology Security techniques Encryption algorithms Part 3: Block ciphers3 Terms and definitionsFor t

31、he purposes of this document, the following terms and definitions apply.NOTE Abbreviations used in this part of ISO 11568 are given in Annex C. INTERNATIONAL STANDARD ISO 11568-2:2012(E) ISO 2012 All rights reserved 1BS ISO 11568-2:2012ISO 11568-2:2012(E)3.1cipherpair of operations that effect trans

32、formations between plaintext and ciphertext under the control of a parameter called a keyNOTE The encipherment operation transforms data (plaintext) into an unintelligible form (ciphertext). The decipherment operation restores the plaintext.3.2counterincrementing count used between two parties, e.g.

33、 to control successive key distributions under a particular key encipherment key3.3cryptographic keymathematical value that is used in an algorithm to transform plain text into cipher text, or vice versa3.4data integrityproperty that data has not been altered or destroyed in an unauthorized manner3.

34、5data keycryptographic key used for the encipherment, decipherment or authentication of data3.6dual controlprocess of utilizing two or more separate entities (usually persons) operating in concert to protect sensitive functions or information, whereby no single entity is able to access or utilize th

35、e materialsNOTE Materials might be, for example, the cryptographic key.3.7hexadecimal digitsingle character in the range 0 to 9, A to F (upper case), representing a four-bit string3.8key componentone of at least two randomly or pseudo-randomly generated parameters having the characteristics (e.g. fo

36、rmat, randomness) of a cryptographic key that is combined with one or more like parameters (e.g. by means of modulo-2 addition) to form a cryptographic key3.9key mailertamper-evident envelope that has been designed to convey a key component to an authorized person3.10key offsetoffsetresult of adding

37、 a counter to a cryptographic key using modulo-2 addition3.11key spaceset of all possible keys used within a cipher3.12key transfer devicesecure cryptographic device that provides key import, storage and export functionalitiesNOTE See ISO 13491-2:2005, Annex F.2 ISO 2012 All rights reservedBS ISO 11

38、568-2:2012ISO 11568-2:2012(E)3.13key transformationderivation of a new key from an existing key using a non-reversible process3.14MACmessage authentication codecode in a message between an originator and a recipient, used to validate the source and part or all of the text of a messageNOTE The code i

39、s the result of an agreed calculation.3.15modulo-2 additionXORexclusive-orbinary addition with no carry, giving the following values:0 + 0 = 00 + 1 = 11 + 0 = 11 + 1 = 03.16n-bit block cipherblock cipher algorithm with the property that plaintext blocks and ciphertext blocks are n-bits in length3.17

40、notarizationmethod of modifying a key encipherment key in order to authenticate the identities of the originator and the ultimate recipient3.18originatorparty that is responsible for originating a cryptographic message3.19pseudo-randomstatistically random and essentially unpredictable although gener

41、ated by an algorithmic processNOTE Pseudo-random number generators commonly found in commercial software packages do not provide sufficient randomness for use in cryptographic operations.3.20recipientparty that is responsible for receiving a cryptographic message3.21secure cryptographic deviceSCDdev

42、ice that provides secure storage for secret information, such as keys, and provides security services based on this secret informationNOTE See ISO 13491-2. ISO 2012 All rights reserved 3BS ISO 11568-2:2012ISO 11568-2:2012(E)3.22split knowledgecondition under which two or more parties separately and

43、confidentially have custody of the constituent part of a single cryptographic key which, individually, conveys no knowledge of the resultant cryptographic key4 General environment for key management techniques4.1 GeneralThe techniques that may be used to provide the key management services are descr

44、ibed in Clause 5 and the key life cycle in Clause 6. This clause describes the environment within which those techniques operate and introduces some fundamental concepts and operations, which are common to several techniques.4.2 Functionality of a secure cryptographic device4.2.1 GeneralThe most fun

45、damental cryptographic operations for a symmetric block cipher are to encipher and decipher a block of data using a supplied secret key. For multiple blocks of data, these operations might use a mode of operation of the cipher as described in ISO/IEC 10116. At this level, no meaning is given to the

46、data, and no particular significance is given to the keys. Typically, in order to provide the required protection for keys and other sensitive information, a secure cryptographic device provides a higher level functional interface, whereby each operation includes several of the fundamental cryptogra

47、phic operations using some combination of keys and data obtained from the interface or from an intermediate result. These complex cryptographic operations are known as functions, and each one operates only on data and keys of the appropriate type.4.2.2 Data typesApplication level cryptography assign

48、s meaning to data, and data with differing meanings are manipulated and protected in different ways by the secure cryptographic device. Data with a specific meaning constitutes a data type.The secure cryptographic device ensures that it is not possible to manipulate a data type in an inappropriate m

49、anner. For example, a PIN is a data type which is required to remain secret, whereas other transaction data may constitute a data type which requires authentication but not secrecy.A cryptographic key may be regarded as a special data type. A secure cryptographic device ensures that a key can exist only in the permitted forms given in 4.7.2.4.2.3 Key typesA key is categorized according to the type of data on which it operates and the manner in which it operates. The secure cryptographic device ensures

展开阅读全文
相关资源
  • ONORM EN ISO 11568-2-1996 Banking-Key management (retail)-Part 2 Key management techniques for symmetric ciphers《银行 密钥管理(零售)修改2 对称加密的密钥管理技术(ISO 11568-2-1994)》.pdfONORM EN ISO 11568-2-1996 Banking-Key management (retail)-Part 2 Key management techniques for symmetric ciphers《银行 密钥管理(零售)修改2 对称加密的密钥管理技术(ISO 11568-2-1994)》.pdf
  • ONORM EN ISO 11568-3-1996 Banking-Key management (retail)-Part 3 Key life cycle for symmetric ciphers《密钥管理(零售) 第3部分:对称加密的密钥(ISO 11568-3-1994)》.pdfONORM EN ISO 11568-3-1996 Banking-Key management (retail)-Part 3 Key life cycle for symmetric ciphers《密钥管理(零售) 第3部分:对称加密的密钥(ISO 11568-3-1994)》.pdf
  • GM T 0044.4-2016 SM9标识密码算法 第4部分:密钥封装机制和公钥加密算法.pdfGM T 0044.4-2016 SM9标识密码算法 第4部分:密钥封装机制和公钥加密算法.pdf
  • GM T 0044.4-2016 SM9标识密码算法 第4部分:密钥封装机制和公钥加密算法.pdfGM T 0044.4-2016 SM9标识密码算法 第4部分:密钥封装机制和公钥加密算法.pdf
  • TCVN 7817-1-2007 Information technology Cryptographic technique Key management Part 1 Framework《信息技术 加密技术 密钥管理 第1部分 框架》.pdfTCVN 7817-1-2007 Information technology Cryptographic technique Key management Part 1 Framework《信息技术 加密技术 密钥管理 第1部分 框架》.pdf
  • CNS 14207-1998 Transmission of non-telephone signals - Encryption key management and authentication system for audiovisual services《非电话信号之传输–视听服务之加密钥管理与鉴别系统》.pdfCNS 14207-1998 Transmission of non-telephone signals - Encryption key management and authentication system for audiovisual services《非电话信号之传输–视听服务之加密钥管理与鉴别系统》.pdf
  • ANSI X9.62-2005 Public Key Cryptography for the Financial Services Industry  The Elliptic Curve Digital Signature Algorithm (ECDSA)《金融服务业用公开密钥加密 椭圆曲线数字签名规则(ECDSA)》.pdfANSI X9.62-2005 Public Key Cryptography for the Financial Services Industry The Elliptic Curve Digital Signature Algorithm (ECDSA)《金融服务业用公开密钥加密 椭圆曲线数字签名规则(ECDSA)》.pdf
  • TCVN 7817-3-2007 Information technology Cryptographic technique Key management Part 3 Mechanisms using asymmetric techniques《信息技术 加密技术 密钥管理 第3部分 不对称技术应用机制》.pdfTCVN 7817-3-2007 Information technology Cryptographic technique Key management Part 3 Mechanisms using asymmetric techniques《信息技术 加密技术 密钥管理 第3部分 不对称技术应用机制》.pdf
  • ANSI X9.42-2003 Public Key Cryptography for the Financial Services Agreement of Symmetric Keys Using Discrete Logarithm Cryptography《金融业务的公开密钥加密 使用离散对数密码术的对称密码协议》.pdfANSI X9.42-2003 Public Key Cryptography for the Financial Services Agreement of Symmetric Keys Using Discrete Logarithm Cryptography《金融业务的公开密钥加密 使用离散对数密码术的对称密码协议》.pdf
  • 猜你喜欢
    相关搜索
    资源标签

    当前位置:首页 > 标准规范 > 国际标准 > BS

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1