• There are no items in your cart

EN 1546-2:1999

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

Identification card systems - Inter-sector electronic purse - Part 2: Security architecture

Withdrawn date

13-01-2016

Published date

14-07-1999

Sorry this product is not available in your region.

Foreword
1 Scope
2 Normative references
3 Definitions, symbols and abbreviations
  3.1 Definitions
      3.1.1 Terms defined in prEN 1546-1
      3.1.2 Terms specific to this part of EN 1546
  3.2 Symbols
  3.3 Abbreviations
  3.4 Special notation
4 Security Architecture
  4.1 Security requirements and characteristics
  4.2 Error handling
  4.3 Security relevant data elements
  4.4 Security procedures
      4.4.1 General notes
      4.4.2 Load (optional)
      4.4.3 Purchase
      4.4.4 Purchase Cancellation/IEP Balance Recovery
            (optional)
Annex A (informative) Additional security procedures
      A.1 IEP transactions
      A.2 SAM transactions
Annex B (informative) Security requirements and security
        mechanisms
Annex C (informative) Key Management
      C.1 General
      C.2 Key Management for symmetric algorithms
      C.3 Key Management for asymmetric algorithms
Annex D (informative) High-level overview of the Purchase
        transaction
Annex E (informative) Security protocols using DES
      E.1 Specific notes for DES
      E.2 Data elements specific for DES
      E.3 Security protocols
Annex F (informative) Security protocols using RSS/DSS
      F.1 Specific notes for RSA
      F.2 Specific notes for DSS
      F.3 Use of public key certificates in IEP Systems
      F.4 Data elements specific for RSA/DSS
      F.5 Implementation notes for RSA/DSS
      F.6 Security protocols
Annex G (informative) Purchase transaction using 3-step
        interactive Signatures
      G.1 Data elements
      G.2 Changes to subclause
      G.3 Specific notes for interactive Signatures
      G.4 Data elements specific to interactive Signatures
      G.5 Security protocols

This part of prEN 1546 defines the detailed security architecture for IEP systems as they are described in prEN 1546-1. It also describes the application protocols the use of cryptographic algorithms and some underlying assumptions concerning the key management necessary to implement IEP systems with sufficient security levels. The general architecture described here allows many types of implementation. It should be noted that the informative annexes of this standard focus on particular implementations.

Committee
CEN/TC 224
DocumentType
Standard
PublisherName
Comite Europeen de Normalisation
Status
Withdrawn

Standards Relationship
BS EN 1546-2:2000 Identical
SNV BS EN 1546-2 : 1999 Identical
UNE-EN 1546-2:1999 Identical
DIN EN 1546-2:2000-10 Identical
NS EN 1546-2 : 1ED 1999 Identical
NBN EN 1546-2 : 1999 Identical
NEN EN 1546-2 : 1999 Identical
NF EN 1546-2 : 2001 Identical
I.S. EN 1546-2:1999 Identical
PN EN 1546-2 : 2003 Identical
UNI EN 1546-2 : 1999 Identical
PNE-EN 1546-2 Identical

BS EN 1546-4:1999 Identification card systems. Inter-sector electronic purse Data objects
I.S. EN 1546-4:2000 IDENTIFICATION CARD SYSTEMS - INTER-SECTOR ELECTRONICS PURSE - PART 4 - DATA OBJECTS
I.S. EN 1546-3:1999 IDENTIFICATION CARD SYSTEMS - INTER-SECTOR ELECTRONIC PURSE - DATA ELEMENTS AND INTERCHANGES
BS EN 1546-3:2000 Identification card systems. Inter-sector electronic purse Data elements and interchanges
EN 1546-3:1999 Identification card systems - Inter-sector electronic purse - Part 3: Data elements and interchanges
EN 1546-4:1999 Identification card systems - Inter-sector electronic purse - Part 4: Data objects

ISO 8372:1987 Information processing Modes of operation for a 64-bit block cipher algorithm
EN 1546-3:1999 Identification card systems - Inter-sector electronic purse - Part 3: Data elements and interchanges
ISO/IEC 9797:1994 Information technology — Security techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.