Specifies key management principles for cryptographic keys used in the authentication, encryption and decryption of electronic messages relating to financial transactions. Covers generation, disclosure, substitution, separation, replacement, verification and destruction of keys. An appendix discusses key management within terminal cryptographic units.
Content history
Please select a variation to view its description.