• Shopping Cart
    There are no items in your cart

PREN 419212-5 : DRAFT 2016

Current

Current

The latest, up-to-date edition.

APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 5: TRUSTED ESERVICE

Published date

24-10-2016

Sorry this product is not available in your region.

European foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations and notation
5 Additional Service Selection
6 Client/Server Authentication
7 Role Authentication
8 Symmetric key transmission between
   a remote server and the ICC
9 Signature verification
10 Certificates for additional services
11 APDU data structures
Annex A (informative) - Security Service
        Descriptor Templates
Annex B (informative) - Example of DF.CIA
Bibliography

Defines additional mechanisms like key decipherment, Client Server authentication, identity management and privacy related services.

Committee
TC 224
DocumentType
Draft
PublisherName
Comite Europeen de Normalisation
Status
Current

I.S. EN 419212-3:2017 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 3: DEVICE AUTHENTICATION PROTOCOLS
BS EN 419212-3:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Device authentication protocols
EN 419212-3:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 3: Device authentication protocols

ISO/IEC 7816-8:2016 Identification cards Integrated circuit cards Part 8: Commands and mechanisms for security operations
ISO/IEC 7816-4:2013 Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange
ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.