BS EN 726-2:1996
Current
The latest, up-to-date edition.
Identification card systems. Telecommunications. Integrated circuit(s) cards and terminals Security framework
Hardcopy , PDF
English
15-04-1996
Foreword
1 Scope
2 Normative references
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4 Reference model
5 General security approach
5.1 Methodology
5.2 Identifying security requirements
5.2.1 Manufacturing of IC and IC card (phase 1)
5.2.2 Card preparation phase (phase 2)
5.2.3 Application preparation (phase 3)
5.2.4 Usage phase (phase 4)
5.2.5 Termination of use (phase 5)
5.3 General security services
5.3.1 Access control service
5.3.2 Authentication service
5.3.3 Confidentiality service
5.3.4 Integrity service
5.3.5 Non-repudiation service
5.3.6 Audit service
5.4 General security mechanisms
6 Application independent security
6.1 Application independent security requirements
6.1.1 Manufacturing of IC and IC card (phase 1)
6.1.2 Card preparation phase ([phase 2)
6.1.3 Application preparation phase (phase 3)
6.1.4 Usage phase (phase 4)
6.1.5 Termination of use (phase 5)
6.2 Application of independent security services
6.3 Application independent security mechanisms
6.3.1 Access control information
6.3.2 PIN mechanism
6.3.3 Internal authentication
6.3.4 External authentication
6.3.5 Protected mode
6.3.6 Stamped mode
6.3.7 Load key file
7 Application dependent security
7.1 Methodology
7.2 Flowchart
Annex
A (normative) Usage of TESA-7 algorithm in
telecommunication applications in accordance with
EN 726
A.1 Introduction
A.2 General specification of external interfaces for
TESA-7 modes:
A.2.1 Key Establishment Function
A.2.2 Authentication function
A.2.3 Mac mode
A.2.4 Inverse Key Establishment function
A.2.5 Key diversification mode
A.3 Usage of TESA-7 algorithm
A.3.1 INTERNAL AUTHENTICATION/VERIFY CRYPTOGRAM
A.3.2 EXTERNAL AUTHENTICATION/COMPUTE CRYPTOGRAM
A.3.3 Protected mode/COMPUTE MAC (SM) or DECREASE (SM)
A.3.4 Stamped mode/VERIFY MAC or INCREASE (SM) or
UPDATE (SM)
A.3.5 COMPUTE LOAD KEY
A.3.6 LOAD KEY FILE
A.3.7 Diversify keyset
Specifies a security framework for telecommunication use of Integrated Circuit(s) (IC) cards. Describes: the implementation of the general security approach to the application of independent IC card; a general security approach that leads to a methodology, different card phases for identifying security requirements and a description of security services that can be offered by the IC card; the implementation of the general security approach to applications using IC cards (the result is a methodology that is used to design the set of security mechanisms for specific applications).
Committee |
IST/17
|
DevelopmentNote |
Supersedes 93/652140 DC (08/2005)
|
DocumentType |
Standard
|
Pages |
40
|
PublisherName |
British Standards Institution
|
Status |
Current
|
Supersedes |
Standards | Relationship |
SNV BS EN 726-2 : 1996 | Identical |
I.S. EN 726-2:1996 | Identical |
DIN EN 726-2:1996-08 | Identical |
NEN EN 726-2 : 1996 | Identical |
NBN EN 726-2 : 1996 | Identical |
EN 726-2:1995 | Identical |
NF EN 726-2 : 1996 | Identical |
NS EN 726-2 : 1ED 1996 | Identical |
UNE-EN 726-2:1996 | Identical |
UNI EN 726-2 : 1996 | Identical |
BS EN 1038:1996 | Identification card systems. Telecommunications applications. Integrated circuit(s) card payphone |
BS EN 726-6:1996 | Identification card systems. Telecommunications. Integrated circuit(s) cards and terminals Telecommunication features |
BS ISO/IEC 9798-2:2008 | Information technology. Security techniques. Entity authentication Mechanisms using symmetric encipherment algorithms |
BS EN 726-1:1995 | Identification card systems. Telecommunications. Integrated circuit(s) cards and terminals System overview |
BS ISO/IEC 9798-3 : 1998 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
BS EN 30202-1:1993 | Financial transaction cards. Security architecture of financial transaction systems using integrated circuit cards Card life cycle |
BS EN 726-3:1996 | Identification card systems. Telecommunications. Integrated circuit(s) cards and terminals Application independent card requirements |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.