BSI 15/30327565 DC:2015 Edition
$13.70
BS ISO/IEC 13157-4. Information technology. Telecommunications and information exchange between systems. NFC Security. Part 4. NFC-SEC entity authentication and key agreement using asymmetric cryptography
Published By | Publication Date | Number of Pages |
BSI | 2015 | 35 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
10 | 1 Scope 2 Conformance 3 Normative references |
11 | 4 Terms and definitions |
12 | 5 Conventions and notations 6 Acronyms |
13 | 7 General |
14 | 8 Fields and PDUs for NEAU-A 8.1 Protocol Identifier (PID) 8.2 NFC-SEC-PDUs |
15 | 8.3 TTP involving 8.3.1 TTP policy and field 8.3.2 TTP policy negotiation |
16 | 8.4 Entity identifiers 8.5 Cert field 8.6 Res field |
17 | 9 Primitives 9.1 General requirements |
18 | 9.2 Entity authentication 9.2.1 Mechanisms |
19 | 9.2.2 EC curve 9.2.3 ECDSA 9.2.3.1 Overview 9.2.3.2 Digital signature generation 9.2.3.2.1 Digital signature generation of SigA in VFY_REQ 9.2.3.2.2 Digital signature generation of SigB in ACT_RES 9.2.3.2.3 Digital signature generation of SigTTP in TAEP_RES |
20 | 9.2.3.3 Digital signature verification 9.2.3.3.1 Digital signature verification of SigA in VFY_REQ 9.2.3.3.2 Digital signature verification of SigB in ACT_RES 9.2.3.3.3 Digital signature verification of SigTTP in TAEP_RES 9.2.3.3.4 Digital signature verification of SigTTP in VFY _REQ |
21 | 9.2.4 Certificate validation 9.2.4.1 TTP involved 9.2.4.1.1 Certificate validation process 9.2.4.1.2 Resx generation 9.2.4.1.3 Resx verification 9.2.4.1.3.1 Resx verification of Sender (A) in VFY_REQ 9.2.4.1.3.2 Resx verification of Recipient (B) in TAEP_RES 9.2.4.2 TTP not involved 9.3 Key agreement |
22 | 9.4 Key confirmation 9.5 Key Derivation Function (KDF) 10 NEAU-A mechanism 10.1 Entity authentication involving a TTP 10.1.1 Protocol overview 10.1.2 Preparation |
23 | 10.1.3 Sender (A) transformation |
24 | 10.1.4 Recipient (B) transformation |
25 | 10.1.5 TTP transformation 10.2 Entity authentication without involving a TTP 10.2.1 Protocol overview |
26 | 10.2.2 Preparation 10.2.3 Sender (A) transformation |
27 | 10.2.4 Recipient (B) transformation |
28 | 10.3 Key derivation 10.3.1 Sender (A) 10.3.2 Recipient (B) |
29 | 11 Data Authenticated Encryption in SCH |