12/30255296 DC : DRAFT MAR 2012
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES
23-11-2012
31-12-2014
Foreword
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations and notation
5 Additional Service Selection
6 Client/Server Authentication
7 Role Authentication
8 Symmetric key transmission between a remote
server and the ICC
9 Signature verification
10 Certificates for additional services
11 Privacy Context functions
12 APDU data structures
Annex A (normative) - Security Service Descriptor
Templates
Annex B (informative) - Key and signature formats
for elliptic curves over prime fields GF(p)
Annex C (informative) - Security environments
Annex D (normative) - Algorithm Identifiers - Coding
and specification
Annex E (informative) - Example of DF.CIA
Bibliography
BS EN 14890-2
| Committee |
IST/17
|
| DocumentType |
Draft
|
| PublisherName |
British Standards Institution
|
| Status |
Superseded
|
| SupersededBy |
| Standards | Relationship |
| PREN 14890-2 : DRAFT 2012 | Identical |
| ISO/IEC 7816-8:2016 | Identification cards — Integrated circuit cards — Part 8: Commands and mechanisms for security operations |
| ISO/IEC 7816-9:2004 | Identification cards — Integrated circuit cards — Part 9: Commands for card management |
| ISO/IEC 9594-8:2017 | Information technology — Open Systems Interconnection — The Directory — Part 8: Public-key and attribute certificate frameworks |
| ISO/IEC 7816-4:2013 | Identification cards — Integrated circuit cards — Part 4: Organization, security and commands for interchange |
| ISO/IEC 9796-2:2010 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms |
| ISO/IEC 15946-5:2017 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation |
| FIPS PUB 180 : 2002 | SECURE HASH STANDARD |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.