Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

EN 419212-1:2017

Current
Current

The latest, up-to-date edition.

Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions
Published date

20-09-2017

European foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviations
5 Management Summary
Annex A (normative) - Algorithm Identifiers - Coding and
        Specification
Annex B (informative) - OID values
Annex C (informative) - Build scheme for object
         identifiers defined by EN 419212
Annex D (informative) - Tutorial on Signature
        Technology
Annex E (informative) - Guide to the EN 419212
Bibliography

This part is an informative introduction into the following parts. It gives guidance to the following parts in order to allow an efficient usage of the provided information. Therefore Part 1 provides history, application context, market perspective and a tutorial about the basic understanding of electronic signatures.-Clause 3 provides "Terms and definitions" covering all parts of this standards. The specific parts will contain a similar section which refers to the clause of this Part 1.-Clause 4 provides "Symbols and abbreviations" covering all parts of this standards. The specific parts will contain a similar section which refers to the clause of this Part 1.-Clause 5 provides a Management Summary that describes the market context in which electronic signatures are typically-Annex A provides the algorithm identifies for all parts of the standard.-Annex B provides the algorithm identifies for all parts of the standard.-Annex C provides the build scheme for object identifiers for all parts of the standard.-Annex D "Tutorial on Signature Technology" provides a tutorial which helps the first reader to get familiar with signature technology and its relation to the society that it serves.-Annex E "Guide to the EN 419212" explains the historical and technical evolution of the ESIGN activities which did finally lead to this version of the signature standard.

DevelopmentNote
Supersedes EN 14890-1. (12/2014) Supersedes PREN 419212-1. (10/2017)
DocumentType
Standard
PublisherName
Comite Europeen de Normalisation
Status
Current
SupersededBy
Supersedes

17/30318701 DC : 0 BS ISO/IEC 19286 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PRIVACY-ENHANCING PROTOCOLS AND SERVICES
I.S. EN 419212-3:2017 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 3: DEVICE AUTHENTICATION PROTOCOLS
16/30348455 DC : 0 BS EN 419212-3 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 3: DEVICE AUTHENTICATION PROTOCOLS
PREN 419212-3 : DRAFT 2016 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 3: DEVICE AUTHENTICATION PROTOCOLS
ISO/IEC 19286:2018 Identification cards — Integrated circuit cards — Privacy-enhancing protocols and services
BS EN 419212-3:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Device authentication protocols
BS ISO/IEC 19286:2018 Identification cards. Integrated circuit cards. Privacy-enhancing protocols and services
EN 419212-3:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 3: Device authentication protocols

ISO/IEC 7816-6:2016 Identification cards — Integrated circuit cards — Part 6: Interindustry data elements for interchange
ISO/IEC 19794-2:2011 Information technology — Biometric data interchange formats — Part 2: Finger minutiae data
ISO/IEC 7816-1:2011 Identification cards Integrated circuit cards Part 1: Cards with contacts Physical characteristics
ISO/IEC 11770-5:2011 Information technology Security techniques Key management Part 5: Group key management
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO 11568-2:2012 Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
ISO/IEC 7816-8:2016 Identification cards Integrated circuit cards Part 8: Commands and mechanisms for security operations
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ISO/IEC 7816-2:2007 Identification cards — Integrated circuit cards — Part 2: Cards with contacts — Dimensions and location of the contacts
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 7816-4:2013 Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange
ISO/IEC 7816-3:2006 Identification cards — Integrated circuit cards — Part 3: Cards with contacts — Electrical interface and transmission protocols
ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO/IEC 15946-5:2017 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation
ISO/IEC 7816-5:2004 Identification cards — Integrated circuit cards — Part 5: Registration of application providers
ISO/IEC 7816-15:2016 Identification cards Integrated circuit cards Part 15: Cryptographic information application
ISO/IEC 14888-2:2008 Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms
ISO/IEC 7816-11:2004 Identification cards Integrated circuit cards Part 11: Personal verification through biometric methods
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

View more information
Sorry this product is not available in your region.

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more