I.S. EN 14890-2:2008
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES
Hardcopy , PDF
27-12-2014
English
01-01-2008
For Harmonized Standards, check the EU site to confirm that the Standard is cited in the Official Journal.
Only cited Standards give presumption of conformance to New Approach Directives/Regulations.
Dates of withdrawal of national standards are available from NSAI.
Foreword
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations and notation
5 Additional Service Selection
6 Client/Server Authentication
6.1 General
6.2 Client/Server protocols
6.3 Steps preceding the client/server authentication
6.4 Padding format
6.5 Client/Server protocol
7 Role Authentication
7.1 Role Authentication of the card
7.2 Role Authentication of the server
7.3 Symmetrical external authentication
7.4 Asymmetric external authentication
8 Encryption Key Decipherment
8.1 Steps preceding the key decryption
8.2 Key Management with RSA
8.3 Diffie-Hellman key exchange
8.4 Algorithm Identifier for DECIPHER
9 Signature verification
9.1 Signature verification execution flow
10 Certificates for additional services
10.1 File structure
10.2 EF.C.CH.AUT
10.3 EF.C.CH.KE
10.4 Reading Certificates and the public key of CAs
11 APDU data structures
11.1 Algorithm Identifiers
11.2 CRTs
Annex A (normative) - Security Service Descriptor Templates
A.1 Introduction
A.2 Security Service Descriptor Concept
A.3 SSD Data Objects
A.4 Location of the SSD templates
A.5 Examples for SSD templates
Annex B (informative) - Key and signature formats for elliptic
curves over prime fields GF(p)
B.1 General
B.2 Elliptic curve parameters
B.3 Public key point
B.4 ECDSA signature format
Annex C (informative) - Security environments
C.1 Introduction
C.2 Definition of CRTs (examples)
C.3 Security Environments (example)
C.4 Coding of access conditions (example)
Annex D (informative) - Interoperability aspects
D.1 General
D.2 Choosing device authentication
D.3 Choosing User verification method
Annex E (informative) - Example of DF.CIA
Bibliography
Specifies additional functionality to support generic Identification, Authentication and Digital Signature (IAS) services.
DevelopmentNote |
Supersedes I.S. CWA 14890-2. (01/2009)
|
DocumentType |
Standard
|
Pages |
80
|
PublisherName |
National Standards Authority of Ireland
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
Standards | Relationship |
EN 14890-2:2008 | Identical |
ISO/IEC 7816-8:2016 | Identification cards Integrated circuit cards Part 8: Commands and mechanisms for security operations |
ISO/IEC 7816-9:2004 | Identification cards Integrated circuit cards Part 9: Commands for card management |
ISO/IEC 7816-4:2013 | Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange |
FIPS PUB 180 : 2002 | SECURE HASH STANDARD |
EN 14890-1:2008 | Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.