I.S. EN 1546-2:1999
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
IDENTIFICATION CARD SYSTEMS - INTER-SECTOR ELECTRONIC PURSE - SECURITY ARCHITECTURE
Hardcopy , PDF
17-02-2016
English
26-11-1999
For Harmonized Standards, check the EU site to confirm that the Standard is cited in the Official Journal.
Only cited Standards give presumption of conformance to New Approach Directives/Regulations.
Dates of withdrawal of national standards are available from NSAI.
Foreword
1 Scope
2 Normative references
3 Definitions, symbols and abbreviations
3.1 Definitions
3.1.1 Terms defined in prEN 1546-1
3.1.2 Terms specific to this part of EN 1546
3.2 Symbols
3.3 Abbreviations
3.4 Special notation
4 Security Architecture
4.1 Security requirements and characteristics
4.2 Error handling
4.3 Security relevant data elements
4.4 Security procedures
4.4.1 General notes
4.4.2 Load (optional)
4.4.3 Purchase
4.4.4 Purchase Cancellation/IEP Balance Recovery
(optional)
Annex A (informative) Additional security procedures
A.1 IEP transactions
A.2 SAM transactions
Annex B (informative) Security requirements and security
mechanisms
Annex C (informative) Key Management
C.1 General
C.2 Key Management for symmetric algorithms
C.3 Key Management for asymmetric algorithms
Annex D (informative) High-level overview of the Purchase
transaction
Annex E (informative) Security protocols using DES
E.1 Specific notes for DES
E.2 Data elements specific for DES
E.3 Security protocols
Annex F (informative) Security protocols using RSS/DSS
F.1 Specific notes for RSA
F.2 Specific notes for DSS
F.3 Use of public key certificates in IEP Systems
F.4 Data elements specific for RSA/DSS
F.5 Implementation notes for RSA/DSS
F.6 Security protocols
Annex G (informative) Purchase transaction using 3-step
interactive Signatures
G.1 Data elements
G.2 Changes to subclause
G.3 Specific notes for interactive Signatures
G.4 Data elements specific to interactive Signatures
G.5 Security protocols
Specifies the detailed security architecture for IEP systems. Describes the application protocols, the use of cryptographic algorithms and underlying assumptions relating to the key management necessary to implement IEP systems with sufficient security levels.
DocumentType |
Standard
|
Pages |
108
|
PublisherName |
National Standards Authority of Ireland
|
Status |
Withdrawn
|
Standards | Relationship |
BS EN 1546-2:2000 | Identical |
DIN EN 1546-2:2000-10 | Identical |
NS EN 1546-2 : 1ED 1999 | Identical |
NBN EN 1546-2 : 1999 | Identical |
NEN EN 1546-2 : 1999 | Identical |
EN 1546-2:1999 | Identical |
NF EN 1546-2 : 2001 | Identical |
UNI EN 1546-2 : 1999 | Identical |
ISO 8372:1987 | Information processing Modes of operation for a 64-bit block cipher algorithm |
EN 1546-3:1999 | Identification card systems - Inter-sector electronic purse - Part 3: Data elements and interchanges |
ISO/IEC 9797:1994 | Information technology — Security techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.