Dit document mag slechts op een stand-alone PC worden geinstalleerd. Gebruik op een netwerk is alleen. toestaan als een aanvullende licentieovereenkomst voor netwerkgebruik met NEN is afgesloten. This document may only be used on a stand-alone PC. Use in a network is only permitted when a supplementary license agreement for us in a network with NEN has been concluded.
eld
be
iew
ev
Pr
or
Vo Nederlandse norm
NEN-ISO 11568-2 (en)
Financial services - Key management (retail) Part 2: Symmetric ciphers, their key management and life cycle (ISO 115682:2012,IDT)
Vervangt NEN-ISO 11568-2:2006
ICS 35.240.40
februari 2012
Dit document is een voorbeeld van NEN / This document is a preview by NEN
NEN-ISO 11568-2
Als Nederlandse norm is aanvaard:
Vo - ISO 11568-2:2012,IDT
be
iew
ev
Pr
or Normcommissie 380068 "Financiele diensten"
THIS PUBLICATION IS COPYRIGHT PROTECTED
DEZE PUBLICATIE IS AUTEURSRECHTELIJK BESCHERMD
The Netherlands Standardization Institute shall, with the exclusion of any other beneficiary, collect payments owed by third parties for duplication and/or act in and out of law, where this authority is not transferred or falls by right to the Reproduction Rights Foundation. Auteursrecht voorbehouden. Behoudens uitzondering door de wet gesteld mag zonder schriftelijke toestemming van het Nederlands Normalisatie-instituut niets uit deze uitgave worden verveelvoudigd en/of openbaar gemaakt door middel van fotokopie, microfilm, opslag in computerbestanden of anderszins, hetgeen ook van toepassing is op gehele of gedeeltelijke bewerking.
eld
Apart from exceptions provided by the law, nothing from this publication may be duplicated and/or published by means of photocopy, microfilm, storage in computer files or otherwise, which also applies to full or partial processing, without the written consent of the Netherlands Standardization Institute.
Although the utmost care has been taken with this publication, errors and omissions cannot be entirely excluded. The Netherlands Standardization Institute and/or the members of the committees therefore accept no liability, not even for direct or indirect damage, occurring due to or in relation with the application of publications issued by the Netherlands Standardization Institute.
Hoewel bij deze uitgave de uiterste zorg is nagestreefd, kunnen fouten en onvolledigheden niet geheel worden uitgesloten. Het Nederlands Normalisatie-instituut en/of de leden van de commissies aanvaarden derhalve geen enkele aansprakelijkheid, ook niet voor directe of indirecte schade, ontstaan door of verband houdend met toepassing van door het Nederlands Normalisatie-instituut gepubliceerde uitgaven.
Het Nederlands Normalisatie-instituut is met uitsluiting van ieder ander gerechtigd de door derden verschuldigde vergoedingen voor verveelvoudiging te innen en/of daartoe in en buiten rechte op te treden, voor zover deze bevoegdheid niet is overgedragen c.q. rechtens toekomt aan de Stichting Reprorecht. ©2012 Nederlands Normalisatie-instituut Postbus 5059, 2600 GB Delft Telefoon (015) 2 690 390, Fax (015) 2 690 190
Dit document is een voorbeeld van NEN / This document is a preview by NEN
NEN-ISO 11568-2:2012
ISO 11568-2
INTERNATIONAL STANDARD
Third edition 2012-02-01
Part 2: Symmetric ciphers, their key management and life cycle
or
Vo
Financial services — Key management (retail) —
Services financiers — Gestion de clés (services aux particuliers) — Partie 2: Algorithmes cryptographiques symétriques, leur gestion de clés et leur cycle de vie
be
iew
ev
Pr
eld Reference number ISO 11568-2:2012(E)
© ISO 2012
Dit document is een voorbeeld van NEN / This document is a preview by NEN
NEN-ISO 11568-2:2012
ISO 11568-2:2012(E)
be
iew
ev
Pr
or
Vo eld
COPYRIGHT PROTECTED DOCUMENT © ISO 2012
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISO’s member body in the country of the requester. ISO copyright office Case postale 56 • CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail
[email protected] Web www.iso.org Published in Switzerland
ii
© ISO 2012 – All rights reserved
Dit document is een voorbeeld van NEN / This document is a preview by NEN
NEN-ISO 11568-2:2012
ISO 11568-2:2012(E)
Contents
Page
Foreword............................................................................................................................................................................. iv Introduction......................................................................................................................................................................... v 1 Scope....................................................................................................................................................................... 1 2
Normative references.......................................................................................................................................... 1
3
Terms and definitions.......................................................................................................................................... 1
or
Vo
4 General environment for key management techniques............................................................................. 4 4.1 General.................................................................................................................................................................... 4 4.2 Functionality of a secure cryptographic device.......................................................................................... 4 4.3 Key generation...................................................................................................................................................... 5 4.4 Key calculation (variants).................................................................................................................................. 6 4.5 Key hierarchies..................................................................................................................................................... 6 4.6 Key life cycle.......................................................................................................................................................... 7 4.7 Key storage............................................................................................................................................................ 9 4.8 Key restoration from back-up......................................................................................................................... 10 4.9 Key distribution and loading........................................................................................................................... 10 4.10 Key use.................................................................................................................................................................. 11 4.11 Key cryptoperiod................................................................................................................................................ 11 4.12 Key replacement................................................................................................................................................. 12 4.13 Key destruction................................................................................................................................................... 12 4.14 Key deletion......................................................................................................................................................... 12 4.15 Key archive.......................................................................................................................................................... 13 4.16 Key termination................................................................................................................................................... 13
be
iew
ev
Pr
5 Techniques for the provision of key management services................................................................... 13 5.1 General.................................................................................................................................................................. 13 5.2 Key encipherment.............................................................................................................................................. 13 5.3 Key variants......................................................................................................................................................... 13 5.4 Key derivation..................................................................................................................................................... 14 5.5 Key transformation............................................................................................................................................ 14 5.6 Key offsetting...................................................................................................................................................... 15 5.7 Key notarization.................................................................................................................................................. 16 5.8 Key tagging.......................................................................................................................................................... 16 5.9 Key verification................................................................................................................................................... 18 5.10 Key identification................................................................................................................................................ 18 5.11 Controls and audit.............................................................................................................................................. 19 5.12 Key integrity......................................................................................................................................................... 19
eld
6 Symmetric key life cycle................................................................................................................................... 20 6.1 General.................................................................................................................................................................. 20 6.2 Key generation.................................................................................................................................................... 20 6.3 Key storage.......................................................................................................................................................... 20 6.4 Key restoration from back-up......................................................................................................................... 21 6.5 Key distribution and loading........................................................................................................................... 21 6.6 Key use.................................................................................................................................................................. 23 6.7 Key replacement................................................................................................................................................. 23 6.8 Key destruction, deletion, archive and termination.................................................................................. 23 7
Key management services cross-reference................................................................................................ 24
Annex A (normative) Notation used in this part of ISO 11568............................................................................... 26 Annex B (normative) Approved algorithms for symmetric key management................................................... 27 Annex C (normative) Abbreviations............................................................................................................................. 28 Bibliography...................................................................................................................................................................... 29
© ISO 2012 – All rights reserved
Dit document is een voorbeeld van NEN / This document is a preview by NEN
iii
NEN-ISO 11568-2:2012
ISO 11568-2:2012(E)
Foreword ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies (ISO member bodies). The work of preparing International Standards is normally carried out through ISO technical committees. Each member body interested in a subject for which a technical committee has been established has the right to be represented on that committee. International organizations, governmental and non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
Vo
The main task of technical committees is to prepare International Standards. Draft International Standards adopted by the technical committees are circulated to the member bodies for voting. Publication as an International Standard requires approval by at least 75 % of the member bodies casting a vote. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO shall not be held responsible for identifying any or all such patent rights.
ISO 11568‑2 was prepared by Technical Committee ISO/TC 68, Financial services, Subcommittee SC 2, Financial Services, security.
or
This third edition cancels and replaces the second edition (ISO 11568‑2:2005), which has been technically revised. ISO 11568 consists of the following parts, under the general title Financial services — Key management (retail): — Part 1: Principles
— Part 2: Symmetric ciphers, their key management and life cycle
be
iew
ev
Pr
— Part 4: Asymmetric cryptosystems — Key management and life cycle
eld iv
© ISO 2012 – All rights reserved
Dit document is een voorbeeld van NEN / This document is a preview by NEN
NEN-ISO 11568-2:2012
ISO 11568-2:2012(E)
Introduction ISO 11568 is one of a series of standards describing procedures for the secure management of cryptographic keys used to protect messages in a retail financial services environment, for instance, messages between an acquirer and a card acceptor, or an acquirer and a card issuer. This part of ISO 11568 addresses the key management requirements that are applicable in the domain of retail financial services. Typical of such services are point-of-sale/point-of-service (POS) debit and credit authorizations and automated teller machine (ATM) transactions.
Vo
This part of ISO 11568 describes key management techniques which, when used in combination, provide the key management services identified in ISO 11568-1. These services are: — key separation;
— key substitution prevention; — key identification;
— key synchronization; — key integrity;
or
— key confidentiality;
— key compromise detection.
The key management services and corresponding key management techniques are cross-referenced in Clause 7.
be
iew
ev
Pr
This part of ISO 11568 also describes the key life cycle in the context of secure management of cryptographic keys for symmetric ciphers. It states both requirements and implementation methods for each step in the life of such a key, utilizing the key management principles, services and techniques described herein and in ISO 11568-1. This part of ISO 11568 does not cover the management or key life cycle for keys used in asymmetric ciphers, which are covered in ISO 11568-4. In the development of ISO 11568, due consideration was given to ISO/IEC 11770; the mechanisms adopted and described in this part of ISO 11568 are those required to satisfy the needs of the financial services industry.
eld © ISO 2012 – All rights reserved
Dit document is een voorbeeld van NEN / This document is a preview by NEN
v
NEN-ISO 11568-2:2012
be
iew
ev
Pr
or
Vo eld Dit document is een voorbeeld van NEN / This document is a preview by NEN
NEN-ISO 11568-2:2012
INTERNATIONAL STANDARD
ISO 11568-2:2012(E)
Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
Vo 1 Scope
This part of ISO 11568 specifies techniques for the protection of symmetric and asymmetric cryptographic keys in a retail banking environment using symmetric ciphers and the life-cycle management of the associated symmetric keys. The techniques described enable compliance with the principles described in ISO 11568-1. The techniques described are applicable to any symmetric key management operation. The notation used in this part of ISO 11568 is given in Annex A.
or
Algorithms approved for use with the techniques described in this part of ISO 11568 are given in Annex B.
2 Normative references
be
Pr
The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
ev
ISO 9564-1, Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems
iew
ISO/IEC 10116, Information technology — Security techniques — Modes of operation for an n-bit block cipher ISO 11568-1:2005, Banking — Key management (retail) — Part 1: Principles ISO 11568-4, Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
eld
ISO 13491-1, Banking — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods ISO 13491-2:2005, Banking — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions ISO 16609, Financial services — Requirements for message authentication using symmetric techniques ISO/IEC 18033-3, Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply. NOTE
Abbreviations used in this part of ISO 11568 are given in Annex C.
© ISO 2012 – All rights reserved
Dit document is een voorbeeld van NEN / This document is a preview by NEN
1
Bestelformulier Stuur naar:
NEN Uitgeverij t.a.v. afdeling Marketing Antwoordnummer 10214 2600 WB Delft
NEN Uitgeverij Postbus 5059 2600 GB Delft Vlinderweg 6 2623 AX Delft T (015) 2 690 390 F (015) 2 690 271
Ja, ik bestel __ ex. NEN-ISO 11568-2:2012 en Bankwezen - Sleutelbeheer (detailhandel) Deel 2: Sleutelbeheertechnieken voor symmetrische vercijferingen
www.nen.nl/normshop
€ 124.99
Wilt u deze norm in PDF-formaat? Deze bestelt u eenvoudig via www.nen.nl/normshop
Stel uw vraag aan Klantenservice via: @NEN_webcare
Gratis e-mailnieuwsbrieven
Retourneren
Wilt u op de hoogte blijven van de laatste ontwikkelingen op het gebied van normen,
Fax: (015) 2 690 271 E-mail:
[email protected] Post: NEN Uitgeverij, t.a.v. afdeling Marketing Antwoordnummer 10214, 2600 WB Delft (geen postzegel nodig).
normalisatie en regelgeving? Neem dan een gratis abonnement op een van onze e-mailnieuwsbrieven. www.nen.nl/nieuwsbrieven
Gegevens Bedrijf / Instelling T.a.v.
O M
O V
Voorwaarden
• De prijzen zijn geldig tot 31 december 2015, E-mail tenzij anders aangegeven. • Alle prijzen zijn excl. btw, Klantnummer NEN verzend- en handelingskosten Uw ordernummer BTW nummer en onder voorbehoud bij o.m. ISO- en IEC-normen. Postbus / Adres • Bestelt u via de normshop een Postcode Plaats pdf, dan betaalt u geen handeling en verzendkosten. Telefoon Fax • Meer informatie: telefoon (015) 2 690 391, dagelijks Factuuradres (indien dit afwijkt van bovenstaand adres) van 8.30 tot 17.00 uur. Postbus / Adres • Wijzigingen en typefouten in teksten en prijsinformatie Postcode Plaats voorbehouden. • U kunt onze algemene voorwaarden terugvinden op: Datum Handtekening www.nen.nl/leveringsvoorwaarden.
Normalisatie: de wereld op één lijn.
preview - 2015