Describes security protocols for use in cards; secure messaging extensions; the mapping of the security mechanisms on to the card's security functions/services, including a description of the in-card security mechanisms; data elements for security support; the use of algorithms implemented on the card (though the algorithms themselves are not described in detail); the use of certificates; security related commands.