ISO/IEC 13157-3:2016
Current
The latest, up-to-date edition.
Information technology — Telecommunications and information exchange between systems — NFC Security — Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
English
29-03-2016
ISO/IEC 13157-3:2016 specifies the message contents and the cryptographic methods for PID 02.
It specifies cryptographic mechanisms that use the Elliptic Curves Diffie-Hellman (ECDH) protocol with a key length of 256 bits for key agreement and the AES algorithm in GCM mode to provide data authenticated encryption.
Committee |
ISO/IEC JTC 1/SC 6
|
DocumentType |
Standard
|
Pages |
8
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Standards | Relationship |
NEN ISO/IEC 13157-3 : 2016 | Identical |
ECMA 415 : 1ED 2016 | NFC-SEC TEST METHODS |
ISO/IEC 22425:2017 | Information technology — Telecommunications and information exchange between systems — NFC-SEC Test Methods |
BS ISO/IEC 22425:2017 | Information technology. Telecommunications and information exchange between systems. NFC-SEC Test Methods |
ECMA 410 : 3ED 2017 | NFC-SEC-03: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING ASYMMETRIC CRYPTOGRAPHY |
ISO/IEC 13157-4:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography |
ECMA 411 : 3ED 2017 | NFC-SEC-04: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING SYMMETRIC CRYPTOGRAPHY |
ISO/IEC 13157-5:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 5: NFC-SEC entity authentication and key agreement using symmetric cryptography |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 19772:2009 | Information technology Security techniques Authenticated encryption |
ISO/IEC 13157-2:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 2: NFC-SEC cryptography standard using ECDH and AES |
ISO/IEC 13157-1:2014 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 1: NFC-SEC NFCIP-1 security services and protocol |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
FIPS PUB 186 : 0 | DIGITAL SIGNATURE STANDARD (DSS) |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.