ECMA 386 : 3ED 2015
Current
The latest, up-to-date edition.
NFC-SEC-01: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES
12-01-2013
1 Scope
2 Conformance
3 Normative references
4 Terms and definitions
5 Conventions and notations
6 Acronyms
7 General
8 Protocol Identifier (PID)
9 Primitives
10 Data Conversions
11 SSE and SCH service invocation
12 SCH data exchange
Annex A (normative) - AES-XCBC-PRF-128 and
AES-XCBC-MAC-96 algorithms
Annex B (normative) - Fields sizes
Annex C (informative) - Informative references
Describes the message contents and the cryptographic methods for PID 01.
DocumentType |
Standard
|
PublisherName |
European Computer Manufacturers Association
|
Status |
Current
|
ECMA 415 : 1ED 2016 | NFC-SEC TEST METHODS |
ISO/IEC 22425:2017 | Information technology — Telecommunications and information exchange between systems — NFC-SEC Test Methods |
ECMA 385 : 4ED 2015 | NFC-SEC: NFCIP-1 SECURITY SERVICES AND PROTOCOL |
ISO/IEC 13157-1:2014 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 1: NFC-SEC NFCIP-1 security services and protocol |
BS ISO/IEC 22425:2017 | Information technology. Telecommunications and information exchange between systems. NFC-SEC Test Methods |
ECMA 410 : 3ED 2017 | NFC-SEC-03: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING ASYMMETRIC CRYPTOGRAPHY |
ECMA 409 : 2ED 2015 | NFC-SEC-02: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH-256 AND AES-GCM |
ECMA 411 : 3ED 2017 | NFC-SEC-04: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING SYMMETRIC CRYPTOGRAPHY |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 15946-1:2016 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ECMA 340 : 3ED 2013 | NEAR FIELD COMMUNICATION - INTERFACE AND PROTOCOL (NFCIP-1) |
ECMA 385 : 4ED 2015 | NFC-SEC: NFCIP-1 SECURITY SERVICES AND PROTOCOL |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.