16/30345811 DC : 0
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
BS EN 419212-2 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES
Hardcopy , PDF
31-01-2018
English
European foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviations
5 Signature application
6 User verification
7 Digital Signature Service
8 Password-based authentication protocols
9 Secure Messaging
10 Key Generation
11 Key identifiers and parameters
12 AlgIDs, Hash- and DSI Formats
13 Files
14 Cryptographic Information Application
Annex A (normative) - Security environments
Annex B (informative) - Seals and Signatures
Annex C (informative) - Remote Signatures
Bibliography
BS EN 419212-2.
Committee |
IST/17
|
DocumentType |
Draft
|
Pages |
116
|
PublisherName |
British Standards Institution
|
Status |
Superseded
|
SupersededBy |
Standards | Relationship |
PREN 419212-2 : DRAFT 2016 | Identical |
EN 419211-5:2013 | Protection profiles for secure signature creation device - Part 5: Extension for device with key generation and trusted channel to signature creation application |
ISO/IEC 19794-2:2011 | Information technology — Biometric data interchange formats — Part 2: Finger minutiae data |
ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
PREN 419241-1 : DRAFT 2017 | TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 1: GENERAL SYSTEM SECURITY REQUIREMENTS |
ISO 11568-2:2012 | Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
ISO/IEC 7816-8:2016 | Identification cards Integrated circuit cards Part 8: Commands and mechanisms for security operations |
EN 419211-1:2014 | Protection profiles for secure signature creation device - Part 1: Overview |
CEN/TS 15480-3:2014 | Identification card systems - European Citizen Card - Part 3: European Citizen Card Interoperability using an application interface |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
FIPS PUB 197 : 2001 | ADVANCED ENCRYPTION STANDARD (AES) |
ISO/IEC 7816-4:2013 | Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange |
FIPS PUB 46 : 0002 | DATA ENCRYPTION STANDARD (DES) |
EN 419211-4:2013 | Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted channel to certificate generation application |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 15946-5:2017 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation |
ISO/IEC 7816-5:2004 | Identification cards — Integrated circuit cards — Part 5: Registration of application providers |
ISO/IEC 7816-15:2016 | Identification cards Integrated circuit cards Part 15: Cryptographic information application |
ISO/IEC 14888-2:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms |
FIPS PUB 180 : 2002 | SECURE HASH STANDARD |
EN 419211-3:2013 | Protection profiles for secure signature creation device - Part 3: Device with key import |
EN 419211-2:2013 | Protection profiles for secure signature creation device - Part 2: Device with key generation |
ISO/IEC 7816-11:2004 | Identification cards Integrated circuit cards Part 11: Personal verification through biometric methods |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.