BS EN 419212-2:2017
Current
The latest, up-to-date edition.
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Signature and Seal Services
Hardcopy , PDF
English
11-01-2018
European foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviations
5 Signature application
6 User verification
7 Digital Signature Service
8 Password-based authentication protocols
9 Secure Messaging
10 Key Generation
11 Key identifiers and parameters
12 AlgIDs, Hash- and DSI Formats
13 Files
14 Cryptographic Information Application
Annex A (normative) - Security environments
Annex B (informative) - Seals and Signatures
Annex C (informative) - Remote Signatures
Bibliography
Defines mechanisms for SEs to be used as qualified signature creation devices covering: - Signature creation and mobile signature creation; - User verification; - Password based authentication.
Committee |
IST/17
|
DevelopmentNote |
Supersedes BS EN 14890-2 & 12/30255296 DC. (12/2014) Supersedes 16/30345811 DC. (01/2018)
|
DocumentType |
Standard
|
Pages |
110
|
PublisherName |
British Standards Institution
|
Status |
Current
|
Supersedes |
This part specifies mechanisms for SEs to be used as qualified signature creation devices covering: • Signature creation and mobile signature creation • User verification • Password based authentication The specified mechanisms are suitable for other purposes like services in the context of EU Regulation 910/2014 of the European Parliament and the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC. The particular case of seal is also covered by the specification. The differences between seal and signature are exposed in Annex B. Annex B also explains how the mechanisms for SEs as qualified signature creation devices can be used for SEs as qualified seal creation devices. Mobile signature is an alternative to the classical signature case which is performed by a secure element. Mobile signature is encouraged by the large widespread of mobile devices and the qualification authorized by the eIDAS Regulation. The particular case of remote signature (or server signing) is covered by this specification in Annex C. In the rest of this document, except Annex B, there will be no particular notion of a seal since it technically compares to the signature.
Standards | Relationship |
EN 419212-2:2017 | Identical |
ISO/IEC 19794-2:2011 | Information technology — Biometric data interchange formats — Part 2: Finger minutiae data |
ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
PREN 419241-1 : DRAFT 2017 | TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 1: GENERAL SYSTEM SECURITY REQUIREMENTS |
ISO 11568-2:2012 | Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
ISO/IEC 7816-8:2016 | Identification cards Integrated circuit cards Part 8: Commands and mechanisms for security operations |
CEN/TS 15480-3:2014 | Identification card systems - European Citizen Card - Part 3: European Citizen Card Interoperability using an application interface |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
FIPS PUB 197 : 2001 | ADVANCED ENCRYPTION STANDARD (AES) |
ISO/IEC 7816-4:2013 | Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange |
FIPS PUB 46 : 0002 | DATA ENCRYPTION STANDARD (DES) |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 15946-5:2017 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation |
ISO/IEC 7816-15:2016 | Identification cards Integrated circuit cards Part 15: Cryptographic information application |
ISO/IEC 14888-2:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms |
FIPS PUB 180 : 2002 | SECURE HASH STANDARD |
ISO/IEC 7816-11:2004 | Identification cards Integrated circuit cards Part 11: Personal verification through biometric methods |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.