EN 419212-1:2017
Current
The latest, up-to-date edition.
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions
20-09-2017
European foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviations
5 Management Summary
Annex A (normative) - Algorithm Identifiers - Coding and
Specification
Annex B (informative) - OID values
Annex C (informative) - Build scheme for object
identifiers defined by EN 419212
Annex D (informative) - Tutorial on Signature
Technology
Annex E (informative) - Guide to the EN 419212
Bibliography
This part is an informative introduction into the following parts. It gives guidance to the following parts in order to allow an efficient usage of the provided information. Therefore Part 1 provides history, application context, market perspective and a tutorial about the basic understanding of electronic signatures.-Clause 3 provides "Terms and definitions" covering all parts of this standards. The specific parts will contain a similar section which refers to the clause of this Part 1.-Clause 4 provides "Symbols and abbreviations" covering all parts of this standards. The specific parts will contain a similar section which refers to the clause of this Part 1.-Clause 5 provides a Management Summary that describes the market context in which electronic signatures are typically-Annex A provides the algorithm identifies for all parts of the standard.-Annex B provides the algorithm identifies for all parts of the standard.-Annex C provides the build scheme for object identifiers for all parts of the standard.-Annex D "Tutorial on Signature Technology" provides a tutorial which helps the first reader to get familiar with signature technology and its relation to the society that it serves.-Annex E "Guide to the EN 419212" explains the historical and technical evolution of the ESIGN activities which did finally lead to this version of the signature standard.
Committee |
CEN/TC 224
|
DevelopmentNote |
Supersedes EN 14890-1. (12/2014) Supersedes PREN 419212-1. (10/2017)
|
DocumentType |
Standard
|
PublisherName |
Comite Europeen de Normalisation
|
Status |
Current
|
SupersededBy | |
Supersedes |
Standards | Relationship |
BS EN 419212-1:2017 | Identical |
DIN EN 419212-1:2017-11 | Identical |
NF EN 419212-1 : 2015 | Identical |
NEN EN 419212-1 : 2017 | Identical |
DIN EN 419212-1:2015-03 | Identical |
I.S. EN 419212-1:2017 | Identical |
NBN EN 419212-1 : 2015 | Identical |
UNI EN 419212-1 : 2015 | Identical |
SN EN 419212-1 : 2018 | Identical |
UNE-EN 419212-1:2017 | Identical |
PN EN 419212-1 : 2017 | Identical |
PNE-FprEN 419212-1 | Identical |
NS EN 419212-1 : 2017 | Identical |
17/30318701 DC : 0 | BS ISO/IEC 19286 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PRIVACY-ENHANCING PROTOCOLS AND SERVICES |
I.S. EN 419212-3:2017 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 3: DEVICE AUTHENTICATION PROTOCOLS |
16/30348455 DC : 0 | BS EN 419212-3 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 3: DEVICE AUTHENTICATION PROTOCOLS |
PREN 419212-3 : DRAFT 2016 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 3: DEVICE AUTHENTICATION PROTOCOLS |
ISO/IEC 19286:2018 | Identification cards — Integrated circuit cards — Privacy-enhancing protocols and services |
BS EN 419212-3:2017 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Device authentication protocols |
BS ISO/IEC 19286:2018 | Identification cards. Integrated circuit cards. Privacy-enhancing protocols and services |
EN 419212-3:2017 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 3: Device authentication protocols |
ISO/IEC 7816-6:2016 | Identification cards — Integrated circuit cards — Part 6: Interindustry data elements for interchange |
ISO/IEC 19794-2:2011 | Information technology — Biometric data interchange formats — Part 2: Finger minutiae data |
ISO/IEC 7816-1:2011 | Identification cards — Integrated circuit cards — Part 1: Cards with contacts — Physical characteristics |
ISO/IEC 11770-5:2011 | Information technology Security techniques Key management Part 5: Group key management |
ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
ISO 11568-2:2012 | Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
ISO/IEC 7816-8:2016 | Identification cards Integrated circuit cards Part 8: Commands and mechanisms for security operations |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO/IEC 7816-2:2007 | Identification cards — Integrated circuit cards — Part 2: Cards with contacts — Dimensions and location of the contacts |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
ISO/IEC 7816-4:2013 | Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange |
ISO/IEC 7816-3:2006 | Identification cards — Integrated circuit cards — Part 3: Cards with contacts — Electrical interface and transmission protocols |
ISO/IEC 9796-2:2010 | Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 15946-5:2017 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation |
ISO/IEC 7816-5:2004 | Identification cards — Integrated circuit cards — Part 5: Registration of application providers |
ISO/IEC 7816-15:2016 | Identification cards Integrated circuit cards Part 15: Cryptographic information application |
ISO/IEC 14888-2:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms |
ISO/IEC 7816-11:2004 | Identification cards Integrated circuit cards Part 11: Personal verification through biometric methods |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.