ISO/IEC 13157-5:2016
Current
The latest, up-to-date edition.
Information technology — Telecommunications and information exchange between systems — NFC Security — Part 5: NFC-SEC entity authentication and key agreement using symmetric cryptography
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
English
10-06-2016
ISO/IEC 13157-5:2016 specifies the message contents and the cryptographic mechanisms for PID 04.
ISO/IEC 13157-5:2016 specifies key agreement and confirmation mechanisms providing mutual authentication, using symmetric cryptography.
ISO/IEC 13157-5:2016 adds entity authentication to the services provided by ISO/IEC 13157-3 (ECMA‑409) NFC-SEC-02.
Committee |
ISO/IEC JTC 1/SC 6
|
DocumentType |
Standard
|
Pages |
11
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Standards | Relationship |
NEN ISO/IEC 13157-5 : 2016 | Identical |
ECMA 415 : 1ED 2016 | NFC-SEC TEST METHODS |
BS ISO/IEC 22425:2017 | Information technology. Telecommunications and information exchange between systems. NFC-SEC Test Methods |
ISO/IEC 22425:2017 | Information technology — Telecommunications and information exchange between systems — NFC-SEC Test Methods |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 19772:2009 | Information technology Security techniques Authenticated encryption |
ISO/IEC 7498-1:1994 | Information technology Open Systems Interconnection Basic Reference Model: The Basic Model |
ISO/IEC 13157-2:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 2: NFC-SEC cryptography standard using ECDH and AES |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
ISO/IEC 13157-1:2014 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 1: NFC-SEC NFCIP-1 security services and protocol |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO/IEC 9798-2:2008 | Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
ISO/IEC 18092:2013 | Information technology — Telecommunications and information exchange between systems — Near Field Communication — Interface and Protocol (NFCIP-1) |
ISO/IEC 13157-3:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
ISO/IEC 14443-3:2016 | Identification cards Contactless integrated circuit cards Proximity cards Part 3: Initialization and anticollision |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.