• BS EN 14890-2:2008

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    Application interface for smart cards used as secure signature creation devices Additional services

    Available format(s):  Hardcopy, PDF

    Superseded date:  31-12-2014

    Language(s):  English

    Published date:  31-12-2008

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Abbreviations and notation
    5 Additional Service Selection
    6 Client/Server Authentication
       6.1 General
       6.2 Client/Server protocols
       6.3 Steps preceding the client/server authentication
       6.4 Padding format
       6.5 Client/Server protocol
    7 Role Authentication
       7.1 Role Authentication of the card
       7.2 Role Authentication of the server
       7.3 Symmetrical external authentication
       7.4 Asymmetric external authentication
    8 Encryption Key Decipherment
       8.1 Steps preceding the key decryption
       8.2 Key Management with RSA
       8.3 Diffie-Hellman key exchange
       8.4 Algorithm Identifier for DECIPHER
    9 Signature verification
       9.1 Signature verification execution flow
    10 Certificates for additional services
       10.1 File structure
       10.2 EF.C.CH.AUT
       10.3 EF.C.CH.KE
       10.4 Reading Certificates and the public key of CAs
    11 APDU data structures
       11.1 Algorithm Identifiers
       11.2 CRTs
    Annex A (normative) - Security Service Descriptor Templates
       A.1 Introduction
       A.2 Security Service Descriptor Concept
       A.3 SSD Data Objects
       A.4 Location of the SSD templates
       A.5 Examples for SSD templates
    Annex B (informative) - Key and signature formats for elliptic
            curves over prime fields GF(p)
       B.1 General
       B.2 Elliptic curve parameters
       B.3 Public key point
       B.4 ECDSA signature format
    Annex C (informative) - Security environments
       C.1 Introduction
       C.2 Definition of CRTs (examples)
       C.3 Security Environments (example)
       C.4 Coding of access conditions (example)
    Annex D (informative) - Interoperability aspects
       D.1 General
       D.2 Choosing device authentication
       D.3 Choosing User verification method
    Annex E (informative) - Example of DF.CIA
    Bibliography

    Abstract - (Show below) - (Hide below)

    Specifies additional functionality to support generic Identification, Authentication and Digital Signature (IAS) services.

    General Product Information - (Show below) - (Hide below)

    Committee IST/17
    Development Note Supersedes 07/30161082 DC. (12/2008)
    Document Type Standard
    Publisher British Standards Institution
    Status Superseded
    Superseded By
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 7816-8:2016 Identification cards Integrated circuit cards Part 8: Commands and mechanisms for security operations
    ISO/IEC 7816-9:2004 Identification cards Integrated circuit cards Part 9: Commands for card management
    ISO/IEC 7816-4:2013 Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange
    FIPS PUB 180 : 2002 SECURE HASH STANDARD
    EN 14890-1:2008 Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective