BS-EN-ISO-11568-2-1996.pdf

上传人:来看看 文档编号:3749968 上传时间:2019-09-22 格式:PDF 页数:26 大小:564.65KB
返回 下载 相关 举报
BS-EN-ISO-11568-2-1996.pdf_第1页
第1页 / 共26页
BS-EN-ISO-11568-2-1996.pdf_第2页
第2页 / 共26页
BS-EN-ISO-11568-2-1996.pdf_第3页
第3页 / 共26页
BS-EN-ISO-11568-2-1996.pdf_第4页
第4页 / 共26页
BS-EN-ISO-11568-2-1996.pdf_第5页
第5页 / 共26页
亲,该文档总共26页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

《BS-EN-ISO-11568-2-1996.pdf》由会员分享,可在线阅读,更多相关《BS-EN-ISO-11568-2-1996.pdf(26页珍藏版)》请在三一文库上搜索。

1、BRITISH STANDARD BS EN ISO 11568-2:1996 Implementation of EN ISO 11568-2:1996 Banking Key management (retail) Part 2: Key management techniques for symmetric ciphers The European Standard EN ISO 11568-2:1996 has the status of a British Standard ICS 35.240.40 Licensed Copy: sheffieldun sheffieldun, n

2、a, Wed Nov 15 05:28:06 GMT+00:00 2006, Uncontrolled Copy, (c) BSI BS EN ISO 11568-2:1996 This British Standard, having been prepared under the direction of the Information Systems Technology Assembly, was published under the authority of the Standards Board and comes into effect on 15 November 1996

3、BSI 07-1999 The following BSI references relate to the work on this standard: Committee reference IST/12 Draft for comment 92/66523 DC ISBN 0 580 26437 3 Committees responsible for this British Standard The preparation of this British Standard was entrusted to Technical Committee IST/12, Banking, se

4、curities and other financial services, upon which the following bodies were represented: Association for Payment Clearing Services (APACS) APACS (Bank of England) APACS (Barclays Bank) APACS (Midland Bank) APACS (National Westminster Bank) APACS (Trustee Savings Bank) The following bodies were also

5、represented in the drafting of the standard, through BSI Technical Subcommittee IST/12/4: Association for Payment Clearing Services (APACS) Bank of England Brinson and Partners British Bankers Association (Registrar present to the responsible European committee any enquiries on interpretation, or pr

6、oposals for change, and keep UK interests informed; monitor related international and European developments and promulgate them in the UK. NOTEInternational and European Standards, as well as overseas standards, are available from Customer Services, BSI, 389 Chiswick High Road, London W4 4AL. A Brit

7、ish Standard does not purport to include all the necessary provisions of a contract. Users of British Standards are responsible for their correct application. Compliance with a British Standard does not of itself confer immunity from legal obligations. Summary of pages This document comprises a fron

8、t cover, an inside front cover, pages i and ii, the EN ISO title page, page 2, the ISO title page, pages ii to iv, pages 1 to 14 and a back cover. This standard has been updated (see copyright date) and may have had amendments incorporated. This will be indicated in the amendment table on the inside

9、 front cover. Licensed Copy: sheffieldun sheffieldun, na, Wed Nov 15 05:28:06 GMT+00:00 2006, Uncontrolled Copy, (c) BSI EUROPEAN STANDARD NORME EUROPENNE EUROPISCHE NORM EN ISO 11568-2 June 1996 ICS 35.240.40 Descriptors: Banking, banking documents, financial documents, data storage devices, magnet

10、ic recording, identification cards, credit cards, protection of information, key management, authentication, algorithms English version Banking Key management (retail) Part 2: Key management techniques for symmetric ciphers (ISO 11568-2:1994) Banque Gestion de cls (services aux particuliers) Partie

11、2: Techniques de gestion de cls pour les algorithmes cryptographiques symtriques (ISO 11568-2:1994) Bankwesen Schlsselverwaltung (Einzelhandel) Teil 2: Schlsselverwaltungstechniken fr symmetrische Verschlsselungen (ISO 11568-2:1994) This European Standard was approved by CEN on 1996-05-29. CEN membe

12、rs are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for giving this European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical references concerning such national standards may be obtained on applicatio

13、n to the Central Secretariat or to any CEN member. This European Standard exists in three official versions (English, French, German). A version in any other language made by translation under the responsibility of a CEN member into its own language and notified to the Central Secretariat has the sa

14、me status as the official versions. CEN members are the national standards bodies of Austria, Belgium, Denmark, Finland, France, Germany, Greece, Iceland, Ireland, Italy, Luxembourg, Netherlands, Norway, Portugal, Spain, Sweden, Switzerland and United Kingdom. CEN European Committee for Standardizat

15、ion Comit Europen de Normalisation Europisches Komitee fr Normung Central Secretariat: rue de Stassart 36, B-1050 Brussels 1996 Copyright reserved to CEN members Ref. No. EN ISO 11568-2:1996 E Licensed Copy: sheffieldun sheffieldun, na, Wed Nov 15 05:28:06 GMT+00:00 2006, Uncontrolled Copy, (c) BSI

16、EN ISO 11568-2:1996 BSI 07-1999 2 Foreword The text of the International Standard from Technical Committee ISO/TC 68, Banking and related financial services, of the International Organization for Standardization (ISO) has been taken over as an European Standard by Technical Committee CEN/TC 224, Mac

17、hine-readable cards, related device interfaces and operations, the secretariat of which is held by AFNOR. This European Standard shall be given the status of a national standard, either by publication of an identical text or by endorsement, at the latest by December 1996, and conflicting national st

18、andards shall be withdrawn at the latest by December 1996. According to the CEN/CENELEC Internal Regulations, the national standards organizations of the following countries are bound to implement this European Standard: Austria, Belgium, Denmark, Finland, France, Germany, Greece, Iceland, Ireland,

19、Italy, Luxembourg, Netherlands, Norway, Portugal, Spain, Sweden, Switzerland and the United Kingdom. Licensed Copy: sheffieldun sheffieldun, na, Wed Nov 15 05:28:06 GMT+00:00 2006, Uncontrolled Copy, (c) BSI Licensed Copy: sheffieldun sheffieldun, na, Wed Nov 15 05:28:06 GMT+00:00 2006, Uncontrolled

20、 Copy, (c) BSI EN ISO 11568-2:1996 ii BSI 07-1999 Contents Page Forewordiii Introduction1 1Scope1 2Normative references1 3Definitions1 4General environment for key management techniques2 4.1Functionality of a secure cryptographic device2 4.2Double length keys3 4.3Key generation4 4.4Key calculation4

21、4.5Key hierarchies4 5Techniques for the provision of key management services5 5.1Key encipherment5 5.2Key variants5 5.3Key derivation6 5.4Key transformation6 5.5Key offsetting7 5.6Key notarization7 5.7Key tagging7 5.8Key verification8 5.9Key identification8 5.10 Controls and audit8 6Key management s

22、ervices cross reference9 Annex A (normative) Notation used in this part of ISO 1156810 A.1Operators10 A.2Suffix letters for keys10 A.3Specific keys and key pairs10 Annex B (normative) Approved algorithms for symmetric key management10 Annex C (normative) Abbreviations11 Annex D (informative) Symmetr

23、ic cipher examples12 Annex E (informative) Key variants and control vectors13 E.1Key variants13 E.2Control vectors14 Annex F (informative) Bibliography14 Figure 1 Use of double length keys3 Figure 2 Variant key calculation5 Figure 3 Generation of a derived key6 Figure 4 Generation of future keys6 Fi

24、gure 5 Calculation of a KEK offset (KEKo)7 Figure 6 Tagged key generation7 Figure 7 Tagged key use7 Figure 8 Example of KVC function8 Figure D.1 Example of a symmetric cipher key management system 12 Figure E.1 Example of Control Vectors for “function x”14 Table 19 Table D.1 Examples of key usage at

25、 node B13 Licensed Copy: sheffieldun sheffieldun, na, Wed Nov 15 05:28:06 GMT+00:00 2006, Uncontrolled Copy, (c) BSI EN ISO 11568-2:1996 BSI 07-1999iii Foreword ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies (ISO member bodies). The wo

26、rk of preparing International Standards is normally carried out through ISO technical committees. Each member body interested in a subject for which a technical committee has been established has the right to be represented on that committee. International organizations, governmental and non-governm

27、ental, in liaison with ISO, also take part in the work. ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization. Draft International Standards adopted by the technical committees are circulated to the member bodies for appr

28、oval before their acceptance as International Standards by the ISO Council. They are approved in accordance with ISO procedures requiring at least 75 % approval by the member bodies voting. International Standard ISO 11568-2 was prepared by Technical Committee ISO/TC 68, Banking and related financia

29、l services. Subcommittee SC 6, Financial transaction cards, related media and operations. ISO 11568 consists of the following parts, under the general title Banking Key management (retail): Part 1: Introduction to key management; Part 2: Key management techniques for symmetric ciphers; Part 3: Key l

30、ife cycle for symmetric ciphers; Part 4: Key management techniques for asymmetric ciphers; Part 5: Key life cycle for asymmetric ciphers; Part 6: Key management schemes. Annex A, Annex B and Annex C form an integral part of this part of ISO 11568. Annex D, Annex E and Annex F are for information onl

31、y. Licensed Copy: sheffieldun sheffieldun, na, Wed Nov 15 05:28:06 GMT+00:00 2006, Uncontrolled Copy, (c) BSI iv blank Licensed Copy: sheffieldun sheffieldun, na, Wed Nov 15 05:28:06 GMT+00:00 2006, Uncontrolled Copy, (c) BSI EN ISO 11568-2:1996 BSI 07-19991 Introduction ISO 11568 is one of a series

32、 of standards describing procedures for the secure management of cryptographic keys used to protect messages in a retail banking environment, for instance, messages between an acquirer and a card acceptor, or an acquirer and a card issuer. Key management of keys used in an Integrated Circuit Card (I

33、CC) environment is not covered by ISO 11568 but will be addressed in another ISO standard. Whereas key management in a wholesale banking environment is characterized by the exchange of keys in a relatively high-security environment, this standard addresses the key management requirements that are ap

34、plicable in the accessible domain of retail banking services. Typical of such services are point-of-sale/point-of-service (POS) debit and credit authorizations and automated teller machines (ATM) transactions. ISO 11568-2 describes key management techniques which, when used in combination, provide t

35、he key management services identified in ISO 11568-1. These services are: key separation key substitution prevention key identification key synchronization key integrity key confidentiality key compromise detection The key management services and the corresponding key management techniques are cross

36、 referenced in clause 6. 1 Scope This part of ISO 11568 specifies techniques for the protection of the cryptographic keys for symmetric ciphers used in a retail banking environment. It is applicable to any organization which is responsible for implementing procedures for the protection of keys durin

37、g the life cycle. The techniques described in this part enable compliance with the principles described in ISO 11568-1. The techniques described are applicable to any symmetric n-bit block cipher algorithm. The notation used in this part of ISO 11568 is given in Annex A. Algorithms approved for use

38、with the techniques described in this part of ISO 11568 are given in Annex B. 2 Normative references The following standards contain provisions which, through referenced in this text, constitute provisions of this part of ISO 11568. At the time of publication, the conditions indicated were valid. Al

39、l standards are subject to revision, and parties to agreements based upon this part of ISO 11568 are encouraged to investigate the possibility of applying the most recent edition of the standards indicated below. Members of IEC and ISO maintain registers of currently valid International Standards. I

40、SO 8908:1993, Banking and related fiancial services Vocabulary and data elements. ISO/IEC 10116:1991, Information processing Modes of operation for an n-bit block cipher algorithm. ISO 11568-1:1994, Banking Key management (retail) Part 1: Introduction to key management. ISO 11568-3:1994, Banking Key

41、 management (retail) Part 3: Key life cycle for symmetric ciphers. ANSI X3.92, Data Encryption Algorithm. 3 Definitions For the purposes of this part of ISO 11568, the definitions given in ISO 8908 and the following definitions apply. 3.1 cipher a pair of operations which effect transformations betw

42、een plaintext and ciphertext under the control of a parameter called a key. The encipherment operation transforms data (plaintext) into an unintelligible form (ciphertext). The decipherment operation restores the original text 3.2 counter an incrementing count used between two parties, for example,

43、to control successive key distributions under a particular key encipherment key 3.3 data integrity the property that data has not been altered or destroyed in an unauthorized manner 3.4 data key a cryptographic key used for the encipherment, decipherment or authentication of data 3.5 exclusive-or se

44、e modulo-2 addition Licensed Copy: sheffieldun sheffieldun, na, Wed Nov 15 05:28:06 GMT+00:00 2006, Uncontrolled Copy, (c) BSI EN ISO 11568-2:1996 2 BSI 07-1999 3.6 hexadecimal digit a single character in the range 0-9, A-F (upper case), representing a four bit string 3.7 key component one of at lea

45、st two randomly or pseudo-randomly generated parameters having the characteristics (e.g. format, randomness) of a cryptographic key that is combined with one or more like parameters, e.g. by means of modulo-2 addition, to form a cryptographic key 3.8 key offset; offset the result of adding a counter

46、 to a cryptographic key using modulo-2 addition 3.9 key space the set of all possible keys used within a cipher 3.10 Message Authentication Code (MAC) a code in a message between a originator and recipient used to validate the source and part or all of the text of a message. The code is the result o

47、f an agreed calculation 3.11 modulo-2 addition exclusive-or; XOR: A binary addition with no carry, giving the following values: 0 + 0 = 0 0 + 1 = 1 1 + 0 = 1 1 + 1 = 0 3.12 n-bit block cipher a block cipher algorithm with the property that plaintext blocks and ciphertext blocks are n-bits in length

48、3.13 notarization a method of modifying a key encipherment key in order to authenticate the identities of the originator and the ultimate recipient 3.14 originator the party that is responsible for originating a cryptographic message 3.15 pseudo-random a process that is statistically random and esse

49、ntially unpredictable although generated by an algorithmic process 3.16 recipient the party that is responsible for receiving a cryptographic message 3.17 secure cryptographic device a device that provides security storage for secret information such as keys and provides security services based on this secret information 4 General environment for key management techniques The techniques which may be used to provide the key management services are described in clause 5. This clause descr

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 其他


经营许可证编号:宁ICP备18001539号-1