BS ISO 10202-7:1998
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
Hardcopy , PDF
01-12-2004
English
15-04-2000
1 Scope
2 Normative references
3 Definitions
3.1 Definitions
3.2 Abbreviations
4 General security principles
5 ICC systems key management requirements
5.1 ICC and SAM life cycle
5.2 Key life cycle protection
5.3 Key separation
5.4 Key management services
5.5 Key relationships
5.6 On-line transaction processing
5.7 Off-line transaction processing using a SAM
5.8 CDF and ADF keys
5.9 Physical security
5.10 CADs without a SAM
6 ICC systems cryptographic keys
6.1 Definition of cryptographic keys
6.2 Key hierarchy
7 Key life cycle
7.1 Key generation
7.2 Key storage
7.3 Key backup
7.4 Key distribution and loading
7.5 Key use
7.6 Key replacement
7.7 Key destruction
7.8 Key deletion
7.9 Key archive
7.10 Key termination
7.11 Reserve keys
8 Key management service
8.1 Key encipherment
8.2 Key derivation
8.3 Key offsetting
8.4 Key notarization
8.5 Key tagging
8.6 Key verification
8.7 Key identification
8.7.1 Implicit key identification
8.7.2 Explicit key identification
8.8 Controls and audits
9 ICC and SAM key loading processes
9.1 Loading of initial symmetric keys
9.2 Loading of production keys
9.3 Loading of issuer keys
9.4 Loading of ADF keys
9.5 Loading of public keys
9.6 Loading of secret keys of asymmetric algorithms
9.7 Generation of asymmetric public/secret key pairs
9.8 Test keys
10 Symmetric key management techniques
10.1 Derivation of ICC and SAM keys
10.2 Key Management Technique 1: Static data keys
10.3 Key Management Technique 2: Session keys
10.4 Key Management Technique 3: Unique message keys
10.5 Length of keys
11 Asymmetric key management techniques
11.1 Use of asymmetric key management in a CAD with a
SAM
11.2 Use ofout a SAM
11.3 Public key certification requirements
11.4 Secure storage of secret keys
11.5 Secure storage of public keys
11.6 Exchange of certified public keys
11.7 Key length
11.8 Secure protocols
12 Combined asymmetric/symmetric key management
12.1 Basic requirement
12.2 Exchange of symmetric keys
Annex A (informative) Examples of card life cycle using
symmetric key management
Annex B (informative) Examples of symmetric key management
techniques 1, 2 and 3
Annex C (informative) Example of transaction processing key
management using symmetric key
management technique 3 with implicit
key identification
Annex D (informative) Example of transaction processing key
management using public key management
in a CAD with a SAM
Annex E (informative) Example of transaction processing key
management using public key management
in a CAD without a SAM
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.