NEN EN 726-2 : 1996
Current
The latest, up-to-date edition.
IDENTIFICATION CARD SYSTEMS - TELECOMMUNICATIONS INTEGRATED CIRCUIT(S) CARDS AND TERMINALS - PART 2: SECURITY FRAMEWORK
12-01-2013
Foreword
1 Scope
2 Normative references
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4 Reference model
5 General security approach
5.1 Methodology
5.2 Identifying security requirements
5.2.1 Manufacturing of IC and IC card (phase 1)
5.2.2 Card preparation phase (phase 2)
5.2.3 Application preparation (phase 3)
5.2.4 Usage phase (phase 4)
5.2.5 Termination of use (phase 5)
5.3 General security services
5.3.1 Access control service
5.3.2 Authentication service
5.3.3 Confidentiality service
5.3.4 Integrity service
5.3.5 Non-repudiation service
5.3.6 Audit service
5.4 General security mechanisms
6 Application independent security
6.1 Application independent security requirements
6.1.1 Manufacturing of IC and IC card (phase 1)
6.1.2 Card preparation phase ([phase 2)
6.1.3 Application preparation phase (phase 3)
6.1.4 Usage phase (phase 4)
6.1.5 Termination of use (phase 5)
6.2 Application of independent security services
6.3 Application independent security mechanisms
6.3.1 Access control information
6.3.2 PIN mechanism
6.3.3 Internal authentication
6.3.4 External authentication
6.3.5 Protected mode
6.3.6 Stamped mode
6.3.7 Load key file
7 Application dependent security
7.1 Methodology
7.2 Flowchart
Annex
A (normative) Usage of TESA-7 algorithm in
telecommunication applications in accordance with
EN 726
A.1 Introduction
A.2 General specification of external interfaces for
TESA-7 modes:
A.2.1 Key Establishment Function
A.2.2 Authentication function
A.2.3 Mac mode
A.2.4 Inverse Key Establishment function
A.2.5 Key diversification mode
A.3 Usage of TESA-7 algorithm
A.3.1 INTERNAL AUTHENTICATION/VERIFY CRYPTOGRAM
A.3.2 EXTERNAL AUTHENTICATION/COMPUTE CRYPTOGRAM
A.3.3 Protected mode/COMPUTE MAC (SM) or DECREASE (SM)
A.3.4 Stamped mode/VERIFY MAC or INCREASE (SM) or
UPDATE (SM)
A.3.5 COMPUTE LOAD KEY
A.3.6 LOAD KEY FILE
A.3.7 Diversify keyset
Specifies a security framework for telecommunication use of Integrated Circuit(s) (IC) cards. Describes: the implementation of the general security approach to the application of independent IC card; a general security approach that leads to a methodology, different card phases for identifying security requirements and a description of security services that can be offered by the IC card; the implementation of the general security approach to applications using IC cards (the result is a methodology that is used to design the set of security mechanisms for specific applications).
DocumentType |
Standard
|
PublisherName |
Netherlands Standards
|
Status |
Current
|
Standards | Relationship |
EN 726-2:1995 | Identical |
UNI EN 726-2 : 1996 | Identical |
DIN EN 726-2:1996-08 | Identical |
UNE-EN 726-2:1996 | Identical |
BS EN 726-2:1996 | Identical |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.