ECMA 409 : 2ED 2015
Current
The latest, up-to-date edition.
NFC-SEC-02: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH-256 AND AES-GCM
15-12-2014
1 Scope
2 Conformance
3 Normative references
4 Terms and definitions
5 Conventions and notations
6 Acronyms
7 General
8 Protocol Identifier (PID)
9 Primitives
10 Data Conversions
11 SSE and SCH service invocation
12 SCH data exchange
Annex A (normative) - Fields sizes
Defines cryptographic mechanisms that use the Elliptic Curves Diffie-Hellman (ECDH) protocol with a key length of 256 bits for key agreement and the AES algorithm in GCM mode to provide data authenticated encryption.
DocumentType |
Standard
|
PublisherName |
European Computer Manufacturers Association
|
Status |
Current
|
ECMA 415 : 1ED 2016 | NFC-SEC TEST METHODS |
BS ISO/IEC 22425:2017 | Information technology. Telecommunications and information exchange between systems. NFC-SEC Test Methods |
ECMA 410 : 3ED 2017 | NFC-SEC-03: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING ASYMMETRIC CRYPTOGRAPHY |
ECMA 411 : 3ED 2017 | NFC-SEC-04: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING SYMMETRIC CRYPTOGRAPHY |
ISO/IEC 22425:2017 | Information technology — Telecommunications and information exchange between systems — NFC-SEC Test Methods |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 19772:2009 | Information technology Security techniques Authenticated encryption |
ISO/IEC 13157-2:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 2: NFC-SEC cryptography standard using ECDH and AES |
ISO/IEC 13157-1:2014 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 1: NFC-SEC NFCIP-1 security services and protocol |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ECMA 386 : 3ED 2015 | NFC-SEC-01: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES |
ECMA 385 : 4ED 2015 | NFC-SEC: NFCIP-1 SECURITY SERVICES AND PROTOCOL |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.