• There are no items in your cart

BS EN 1546-2:2000

Current

Current

The latest, up-to-date edition.

Identification card systems. Inter-sector electronic purse Security architecture

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

15-01-2000

€348.24
Excluding VAT

Foreword
1 Scope
2 Normative References
3 Definitions, Symbols and Abbreviations
      3.1 Definitions
             3.1.1 Terms defined in prEN 1546-1
             3.1.2 Terms specific to this part of EN 1546
      3.2 Symbols
      3.3 Abbreviations
      3.4 Special Notation
4 Security Architecture
      4.1 Security requirements and characteristics
      4.2 Error handling
      4.3 Security relevant data elements
      4.4 Security procedures
             4.4.1 General notes
             4.4.2 Load (optional)
             4.4.3 Purchase
             4.4.4 Purchase Cancellation/IEP Balance
                      Recovery (optional)
Annex A (informative) Additional Security Procedures
      A.1 - IEP transactions
            A.1.1 - Currency Exchange
            A.1.2 - IEP Monitoring
            A.1.3 - Update IEP parameter
      A.2 - SAM transactions
            A.2.1 - Collection
            A.2.2 - SAM Monitoring
            A.2.3 - Update SAM parameter
            A.2.4 - Open SAM
            A.2.5 - Close SAM
Annex B (informative) Security Requirements and Security
                      Mechanisms
Annex C (informative) Key Management
      C.1 - General
      C.2 - Key Management for symmetric algorithms
            C.2.1 - IEP/PSAM communication
            C.2.2 - Partitioned master keys for the Purchase
                    transaction
            C.2.3 - IEP/PPSAM communication
            C.2.4 - PSAM/PPSAM communication
            C.2.5 - LSAM/PPSAM communication
            C.2.6 - Key separation
            C.2.7 - Key modification
      C.3 - Key Management for asymmetric algorithms
            C.3.1 - General requirements for key certification
            C.3.2 - Key Management requirements
            C.3.3 - Topology of the IEP System
            C.3.4 - The operational requirements
            C.3.5 - The pre-operational requirements
            C.3.6 - The operational phase key modification
                    requirements
            C.3.7 - Specification of PKCs
            C.3.8 - Key Management requirements for
                    interactive Signatures
Annex D (informative) High-level overview of the Purchase
                      transaction
Annex E (informative) Security protocols using DES
      E.1 - Specific notes for DES
            E.1.1 - Encipherment/Decipherment using DES
            E.1.2 - Authentication using DES
            E.1.3 - Implementation notes for DES
      E.2 - Data elements specific for DES
      E.3 - Security protocols
            E.3.1 - Load
            E.3.2 - Purchase
            E.3.3 - Collection
Annex F (informative) Security protocols using RSA/DSS
      F.1 - Specific notes for RSA
            F.1.1 - Authentication using RSA
            F.1.2 - Public key certification using RSA
      F.2 - Specific notes for DSS
            F.2.1 - Authentication using DSS
            F.2.2 - Public key certification using DSS
      F.3 - Use of public key certificates in IEP Systems
      F.4 - Data elements specific for RSA/DSS
      F.5 - Implementation notes for RSA/DSS
      F.6 - Security protocols
            F.6.1 - Load
            F.6.2 - Purchase
            F.6.3 - Collection
Annex G (informative) Purchase transaction using 3-step
                      interactive Signatures
      G.1 - Data elements
      G.2 - Changes to subclause 4.4.3
      G.3 - Specific notes for interactive Signatures
      G.4 - Data elements specific to interactive Signatures
      G.5 - Security protocols
            G.5.1 - Purchase

Specifies the detailed security architecture for IEP systems. Describes the application protocols, the use of cryptographic algorithms and underlying assumptions relating to the key management necessary to implement IEP systems with sufficient security levels.

Committee
IST/17
DevelopmentNote
Supersedes 94/647063 DC. (09/2005)
DocumentType
Standard
Pages
114
PublisherName
British Standards Institution
Status
Current
Supersedes

Standards Relationship
SNV BS EN 1546-2 : 1999 Identical
DIN EN 1546-2:2000-10 Identical
NS EN 1546-2 : 1ED 1999 Identical
NBN EN 1546-2 : 1999 Identical
NEN EN 1546-2 : 1999 Identical
EN 1546-2:1999 Identical
NF EN 1546-2 : 2001 Identical
I.S. EN 1546-2:1999 Identical
UNI EN 1546-2 : 1999 Identical

ISO 8372:1987 Information processing Modes of operation for a 64-bit block cipher algorithm
EN 1546-3:1999 Identification card systems - Inter-sector electronic purse - Part 3: Data elements and interchanges
ISO/IEC 9797:1994 Information technology — Security techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.