• There are no items in your cart

BS ISO 10202-5:1998

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

Financial transaction cards. Security architecture of financial transaction systems using integrated circuit cards Use of algorithms

Available format(s)

Hardcopy , PDF

Withdrawn date

12-01-2004

Language(s)

English

Published date

03-15-1999

1 Scope
2 Normative references
3 Definitions
4 Notations
4.1 Values and entities
4.2 Processes
4.3 Optionlist
4.4 Functions
4.5 Digital signatures
4.6 Security message format
5 Mapping security functions to process types
6 Process specifications
6.1 Process 1: Key Exchange (KE)
6.1.1 KE-symmetric-symmetric
6.1.2 KE-symmetric-symmetric-mutual-timeliness
6.1.3 KE-symmetric-asymmetric
6.1.4 KE-asymmetric-symmetric
6.1.5 KE-asymmetric-symmetric-mutual
6.1.6 KE-asymmetric-symmetric-mutual-timeliness
6.1.7 KE-asymmetric-asymmetric
6.2 Process 2: Entity Authentication (EA)
6.2.1 EA-symmetric-timeliness
6.2.2 EA-symmetric-timeliness-mutual
6.2.3 EA-asymmetric
6.2.4 EA-asymmetric-timeliness
6.2.5 EA-asymmetric-timeliness-mutual
6.3 Process 3: Message Authentication (MA)
6.3.1 MA-symmetric
6.3.2 MA-symmetric-timeliness
6.3.3 MA-asymmetric
6.3.4 MA-asymmetric-timeliness
6.4 Process 4: Message Encipherment (ME)
6.4.1 ME-symmetric
6.4.2 ME-symmetric-timeliness
6.4.3 ME-asymmetric
6.4.4 ME-asymmetric-timeliness
6.5 Process 5: Transaction Certification (TC)
6.5.1 TC-symmetric
6.5.2 TC-asymmetric
6.5.3 TC-asymmetric-mutual
6.6 Process 6: PIN Verification (PV)
6.6.1 PV symmetric
6.6.2 PV-symmetric-timeliness
6.6.3 PV-asymmetric
6.6.4 PV-asymmetric-timeliness
Annex A (informative) Certification of public keys
Annex B (informative) Key and certificate identifiers
Annex C (informative) Threat matrix
Annex D (informative) ISO security services and security
       mechanisms
Annex E (informative) Timeliness
Annex F (informative) Bibliography
Annex G (informative) Process options and functions
Annex H (informative) Mapping ICC classes to process options

Applicable to cryptographic exchanges where at least one node is an ICC or a SAM. Exchanges between other system nodes are outside the scope. The provision of any security function is optional depending upon requirements of the system. Where a specific function is identified as being required, it shall be performed in the manner described herein.

Committee
IST/12
DevelopmentNote
Supersedes 94/647819 DC. (03/2007)
DocumentType
Standard
Pages
56
PublisherName
British Standards Institution
Status
Withdrawn
Supersedes

Standards Relationship
ISO 10202-5:1998 Identical

ISO 10202-8:1998 Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 8: General principles and overview
ISO 10202-3:1998 Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 3: Cryptographic key relationships
ISO 9564-1:2017 Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems
ISO 10202-6:1994 Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 6: Cardholder verification
ISO 10202-2:1996 Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 2: Transaction process
ISO 4909:2000 Bank cards Magnetic stripe data content for track 3
ISO/IEC 9796:1991 Information technology Security techniques Digital signature scheme giving message recovery
ISO 10202-7:1998 Financial transaction cards Security architecture of financial transaction systems using integrated circuit cards Part 7: Key management

View more information
US$313.84
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.