• UNI EN 419212-1 : 2015

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES

    Available format(s): 

    Superseded date:  20-08-2022

    Language(s): 

    Published date:  01-01-2015

    Publisher:  Ente Nazionale Italiano di Unificazione (UNI)

    Sorry this product is not available in your region.

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols and abbreviations
    5 Signature application
    6 User verification
    7 Digital Signature Service
    8 Device authentication
    9 Password-based authentication protocols
    10 Secure Messaging
    11 Key Generation
    12 Key identifiers and parameters
    13 Data structures
    14 AlgIDs, Hash- and DSI Formats
    15 CV_Certificates and Key Management
    16 Files
    17 Cryptographic Information Application
    Annex A (normative) - Algorithm Identifiers - Coding and
            specification
    Annex B (informative) - Device authentication Protocol
            Properties
    Annex C (informative) - Personalization scenarios
    Annex D (informative) - OID values
    Annex E (informative) - Build scheme for object identifiers
            defined by EN 14890
    Bibliography

    Abstract - (Show below) - (Hide below)

    Defines mechanisms for smart cards to be used as secure signature creation devices covering: - signature creation; - user verification; - password based authentication; - device authentication; - establishment of a secure channel.

    General Product Information - (Show below) - (Hide below)

    Development Note Supersedes UNI EN 14890-1. (02/2015)
    Document Type Standard
    Publisher Ente Nazionale Italiano di Unificazione (UNI)
    Status Superseded
    Superseded By
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
    ISO/IEC 7816-6:2016 Identification cards — Integrated circuit cards — Part 6: Interindustry data elements for interchange
    ISO/IEC 19794-2:2011 Information technology — Biometric data interchange formats — Part 2: Finger minutiae data
    ISO/IEC 11770-5:2011 Information technology Security techniques Key management Part 5: Group key management
    ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
    ISO 11568-2:2012 Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
    ISO/IEC 7816-8:2016 Identification cards Integrated circuit cards Part 8: Commands and mechanisms for security operations
    ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
    ISO/IEC 11770-4:2006 Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets
    PREN 419111-1 : DRAFT 2013 PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - PART 1: INTRODUCTION
    ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
    FIPS PUB 197 : 2001 ADVANCED ENCRYPTION STANDARD (AES)
    CEN/TS 15480-2:2012 Identification card systems - European Citizen Card - Part 2: Logical data structures and security services
    ISO/IEC 7816-4:2013 Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange
    ISO/IEC 7816-3:2006 Identification cards — Integrated circuit cards — Part 3: Cards with contacts — Electrical interface and transmission protocols
    FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
    ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
    ISO/IEC 15946-5:2017 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation
    ISO/IEC 7812-1:2017 Identification cards — Identification of issuers — Part 1: Numbering system
    ISO/IEC 7816-5:2004 Identification cards — Integrated circuit cards — Part 5: Registration of application providers
    ISO/IEC 7816-15:2016 Identification cards Integrated circuit cards Part 15: Cryptographic information application
    ISO/IEC 14888-2:2008 Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms
    FIPS PUB 180 : 2002 SECURE HASH STANDARD
    TS 102 176-1 : 2.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ALGORITHMS AND PARAMETERS FOR SECURE ELECTRONIC SIGNATURES; PART 1: HASH FUNCTIONS AND ASYMMETRIC ALGORITHMS
    ANSI X9.42 : 2003(R2013) PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES: AGREEMENT OF SYMMETRIC KEYS USING DISCRETE LOGARITHM CRYPTOGRAPHY
    ISO/IEC 7816-11:2004 Identification cards Integrated circuit cards Part 11: Personal verification through biometric methods
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective