ISO/IEC 13157-2:2016
Current
The latest, up-to-date edition.
Information technology — Telecommunications and information exchange between systems — NFC Security — Part 2: NFC-SEC cryptography standard using ECDH and AES
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
English
29-03-2016
ISO/IEC 13157-2:2016 specifies the message contents and the cryptographic methods for PID 01.
ISO/IEC 13157-2:2016 specifies cryptographic mechanisms that use the Elliptic Curves Diffie-Hellman (ECDH) protocol for key agreement and the AES algorithm for data encryption and integrity.
Committee |
ISO/IEC JTC 1/SC 6
|
DocumentType |
Standard
|
Pages |
17
|
ProductNote |
THIS STANDARD ALSO REFERS TO FIPS 186-4
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Supersedes |
Standards | Relationship |
NEN ISO/IEC 13157-2 : 2016 | Identical |
ECMA 415 : 1ED 2016 | NFC-SEC TEST METHODS |
ISO/IEC 13157-1:2014 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 1: NFC-SEC NFCIP-1 security services and protocol |
BS ISO/IEC 22425:2017 | Information technology. Telecommunications and information exchange between systems. NFC-SEC Test Methods |
ECMA 410 : 3ED 2017 | NFC-SEC-03: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING ASYMMETRIC CRYPTOGRAPHY |
ECMA 409 : 2ED 2015 | NFC-SEC-02: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH-256 AND AES-GCM |
ISO/IEC 13157-4:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography |
ECMA 411 : 3ED 2017 | NFC-SEC-04: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING SYMMETRIC CRYPTOGRAPHY |
ISO/IEC 13157-5:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 5: NFC-SEC entity authentication and key agreement using symmetric cryptography |
ISO/IEC 22425:2017 | Information technology — Telecommunications and information exchange between systems — NFC-SEC Test Methods |
ISO/IEC 13157-3:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 15946-1:2016 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General |
ISO/IEC 13157-1:2014 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 1: NFC-SEC NFCIP-1 security services and protocol |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO/IEC 18092:2013 | Information technology — Telecommunications and information exchange between systems — Near Field Communication — Interface and Protocol (NFCIP-1) |
FIPS PUB 186 : 0 | DIGITAL SIGNATURE STANDARD (DSS) |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.