• CSA ISO/IEC 7816-8 : 2018

    Withdrawn A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

    IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PART 8: COMMANDS AND MECHANISMS FOR SECURITY OPERATIONS

    Available format(s):  Hardcopy, PDF

    Withdrawn date:  22-07-2021

    Language(s):  English

    Published date:  01-01-2018

    Publisher:  Canadian Standards Association

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols and abbreviated terms
    5 Interindustry commands for security operations
    Annex A (informative) - Examples of operations related
            to digital signature
    Annex B (informative) - Examples of certificates interpreted
            by the card
    Annex C (informative) - Examples of asymmetric key transfer
    Annex D (informative) - Alternatives to achieve the reversible
            change of security context
    Annex E (informative) - Example of uses for generate asymmetric
            key pair command
    Bibliography

    Abstract - (Show below) - (Hide below)

    Defines interindustry commands that may be used for security operations.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Publisher Canadian Standards Association
    Status Withdrawn
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18370-1:2016 Information technology Security techniques Blind digital signatures Part 1: General
    ISO/IEC 9798-5:2009 Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
    ISO/IEC 7816-4:2013 Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange
    ISO/IEC 18370-2:2016 Information technology Security techniques Blind digital signatures Part 2: Discrete logarithm based mechanisms
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective