• Shopping Cart
    There are no items in your cart

ECMA 409 : 2ED 2015

Current

Current

The latest, up-to-date edition.

NFC-SEC-02: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH-256 AND AES-GCM

Published date

15-12-2014

Sorry this product is not available in your region.

1 Scope
2 Conformance
3 Normative references
4 Terms and definitions
5 Conventions and notations
6 Acronyms
7 General
8 Protocol Identifier (PID)
9 Primitives
10 Data Conversions
11 SSE and SCH service invocation
12 SCH data exchange
Annex A (normative) - Fields sizes

Defines cryptographic mechanisms that use the Elliptic Curves Diffie-Hellman (ECDH) protocol with a key length of 256 bits for key agreement and the AES algorithm in GCM mode to provide data authenticated encryption.

DocumentType
Standard
PublisherName
European Computer Manufacturers Association
Status
Current

ECMA 415 : 1ED 2016 NFC-SEC TEST METHODS
BS ISO/IEC 22425:2017 Information technology. Telecommunications and information exchange between systems. NFC-SEC Test Methods
ECMA 410 : 3ED 2017 NFC-SEC-03: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING ASYMMETRIC CRYPTOGRAPHY
ECMA 411 : 3ED 2017 NFC-SEC-04: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING SYMMETRIC CRYPTOGRAPHY
ISO/IEC 22425:2017 Information technology — Telecommunications and information exchange between systems — NFC-SEC Test Methods

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
ISO/IEC 13157-2:2016 Information technology — Telecommunications and information exchange between systems — NFC Security — Part 2: NFC-SEC cryptography standard using ECDH and AES
ISO/IEC 13157-1:2014 Information technology — Telecommunications and information exchange between systems — NFC Security — Part 1: NFC-SEC NFCIP-1 security services and protocol
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ECMA 386 : 3ED 2015 NFC-SEC-01: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES
ECMA 385 : 4ED 2015 NFC-SEC: NFCIP-1 SECURITY SERVICES AND PROTOCOL
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.