Shopping Cart

No products in the cart.

BSI 15/30327565 DC:2015 Edition

$13.70

BS ISO/IEC 13157-4. Information technology. Telecommunications and information exchange between systems. NFC Security. Part 4. NFC-SEC entity authentication and key agreement using asymmetric cryptography

Published By Publication Date Number of Pages
BSI 2015 35
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
10 1 Scope
2 Conformance
3 Normative references
11 4 Terms and definitions
12 5 Conventions and notations
6 Acronyms
13 7 General
14 8 Fields and PDUs for NEAU-A
8.1 Protocol Identifier (PID)
8.2 NFC-SEC-PDUs
15 8.3 TTP involving
8.3.1 TTP policy and field
8.3.2 TTP policy negotiation
16 8.4 Entity identifiers
8.5 Cert field
8.6 Res field
17 9 Primitives
9.1 General requirements
18 9.2 Entity authentication
9.2.1 Mechanisms
19 9.2.2 EC curve
9.2.3 ECDSA
9.2.3.1 Overview
9.2.3.2 Digital signature generation
9.2.3.2.1 Digital signature generation of SigA in VFY_REQ
9.2.3.2.2 Digital signature generation of SigB in ACT_RES
9.2.3.2.3 Digital signature generation of SigTTP in TAEP_RES
20 9.2.3.3 Digital signature verification
9.2.3.3.1 Digital signature verification of SigA in VFY_REQ
9.2.3.3.2 Digital signature verification of SigB in ACT_RES
9.2.3.3.3 Digital signature verification of SigTTP in TAEP_RES
9.2.3.3.4 Digital signature verification of SigTTP in VFY _REQ
21 9.2.4 Certificate validation
9.2.4.1 TTP involved
9.2.4.1.1 Certificate validation process
9.2.4.1.2 Resx generation
9.2.4.1.3 Resx verification
9.2.4.1.3.1 Resx verification of Sender (A) in VFY_REQ
9.2.4.1.3.2 Resx verification of Recipient (B) in TAEP_RES
9.2.4.2 TTP not involved
9.3 Key agreement
22 9.4 Key confirmation
9.5 Key Derivation Function (KDF)
10 NEAU-A mechanism
10.1 Entity authentication involving a TTP
10.1.1 Protocol overview
10.1.2 Preparation
23 10.1.3 Sender (A) transformation
24 10.1.4 Recipient (B) transformation
25 10.1.5 TTP transformation
10.2 Entity authentication without involving a TTP
10.2.1 Protocol overview
26 10.2.2 Preparation
10.2.3 Sender (A) transformation
27 10.2.4 Recipient (B) transformation
28 10.3 Key derivation
10.3.1 Sender (A)
10.3.2 Recipient (B)
29 11 Data Authenticated Encryption in SCH
BSI 15/30327565 DC
$13.70