• ECMA 409 : 2ED 2015

    Current The latest, up-to-date edition.

    NFC-SEC-02: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH-256 AND AES-GCM

    Available format(s): 

    Language(s): 

    Published date:  15-12-2014

    Publisher:  European Computer Manufacturers Association

    Sorry this product is not available in your region.

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    1 Scope
    2 Conformance
    3 Normative references
    4 Terms and definitions
    5 Conventions and notations
    6 Acronyms
    7 General
    8 Protocol Identifier (PID)
    9 Primitives
    10 Data Conversions
    11 SSE and SCH service invocation
    12 SCH data exchange
    Annex A (normative) - Fields sizes

    Abstract - (Show below) - (Hide below)

    Defines cryptographic mechanisms that use the Elliptic Curves Diffie-Hellman (ECDH) protocol with a key length of 256 bits for key agreement and the AES algorithm in GCM mode to provide data authenticated encryption.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Publisher European Computer Manufacturers Association
    Status Current

    Standards Referenced By This Book - (Show below) - (Hide below)

    ECMA 415 : 1ED 2016 NFC-SEC TEST METHODS
    BS ISO/IEC 22425:2017 Information technology. Telecommunications and information exchange between systems. NFC-SEC Test Methods
    ECMA 410 : 3ED 2017 NFC-SEC-03: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING ASYMMETRIC CRYPTOGRAPHY
    ECMA 411 : 3ED 2017 NFC-SEC-04: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING SYMMETRIC CRYPTOGRAPHY
    ISO/IEC 22425:2017 Information technology — Telecommunications and information exchange between systems — NFC-SEC Test Methods

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
    ISO/IEC 13157-2:2016 Information technology Telecommunications and information exchange between systems NFC Security Part 2: NFC-SEC cryptography standard using ECDH and AES
    ISO/IEC 13157-1:2014 Information technology Telecommunications and information exchange between systems NFC Security Part 1: NFC-SEC NFCIP-1 security services and protocol
    ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
    ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
    ECMA 386 : 3ED 2015 NFC-SEC-01: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES
    ECMA 385 : 4ED 2015 NFC-SEC: NFCIP-1 SECURITY SERVICES AND PROTOCOL
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective