• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

BS EN 726-2:1996

Current
Current

The latest, up-to-date edition.

Identification card systems. Telecommunications. Integrated circuit(s) cards and terminals Security framework
Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

15-04-1996

Foreword
1 Scope
2 Normative references
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4 Reference model
5 General security approach
5.1 Methodology
5.2 Identifying security requirements
5.2.1 Manufacturing of IC and IC card (phase 1)
5.2.2 Card preparation phase (phase 2)
5.2.3 Application preparation (phase 3)
5.2.4 Usage phase (phase 4)
5.2.5 Termination of use (phase 5)
5.3 General security services
5.3.1 Access control service
5.3.2 Authentication service
5.3.3 Confidentiality service
5.3.4 Integrity service
5.3.5 Non-repudiation service
5.3.6 Audit service
5.4 General security mechanisms
6 Application independent security
6.1 Application independent security requirements
6.1.1 Manufacturing of IC and IC card (phase 1)
6.1.2 Card preparation phase ([phase 2)
6.1.3 Application preparation phase (phase 3)
6.1.4 Usage phase (phase 4)
6.1.5 Termination of use (phase 5)
6.2 Application of independent security services
6.3 Application independent security mechanisms
6.3.1 Access control information
6.3.2 PIN mechanism
6.3.3 Internal authentication
6.3.4 External authentication
6.3.5 Protected mode
6.3.6 Stamped mode
6.3.7 Load key file
7 Application dependent security
7.1 Methodology
7.2 Flowchart
Annex
A (normative) Usage of TESA-7 algorithm in
        telecommunication applications in accordance with
        EN 726
A.1 Introduction
A.2 General specification of external interfaces for
        TESA-7 modes:
A.2.1 Key Establishment Function
A.2.2 Authentication function
A.2.3 Mac mode
A.2.4 Inverse Key Establishment function
A.2.5 Key diversification mode
A.3 Usage of TESA-7 algorithm
A.3.1 INTERNAL AUTHENTICATION/VERIFY CRYPTOGRAM
A.3.2 EXTERNAL AUTHENTICATION/COMPUTE CRYPTOGRAM
A.3.3 Protected mode/COMPUTE MAC (SM) or DECREASE (SM)
A.3.4 Stamped mode/VERIFY MAC or INCREASE (SM) or
        UPDATE (SM)
A.3.5 COMPUTE LOAD KEY
A.3.6 LOAD KEY FILE
A.3.7 Diversify keyset

Specifies a security framework for telecommunication use of Integrated Circuit(s) (IC) cards. Describes: the implementation of the general security approach to the application of independent IC card; a general security approach that leads to a methodology, different card phases for identifying security requirements and a description of security services that can be offered by the IC card; the implementation of the general security approach to applications using IC cards (the result is a methodology that is used to design the set of security mechanisms for specific applications).

Committee
IST/17
DevelopmentNote
Supersedes 93/652140 DC (08/2005)
DocumentType
Standard
Pages
40
PublisherName
British Standards Institution
Status
Current
Supersedes

Standards Relationship
SNV BS EN 726-2 : 1996 Identical
I.S. EN 726-2:1996 Identical
DIN EN 726-2:1996-08 Identical
NEN EN 726-2 : 1996 Identical
NBN EN 726-2 : 1996 Identical
EN 726-2:1995 Identical
NF EN 726-2 : 1996 Identical
NS EN 726-2 : 1ED 1996 Identical
UNE-EN 726-2:1996 Identical
UNI EN 726-2 : 1996 Identical

BS EN 1038:1996 Identification card systems. Telecommunications applications. Integrated circuit(s) card payphone
BS EN 726-6:1996 Identification card systems. Telecommunications. Integrated circuit(s) cards and terminals Telecommunication features

BS ISO/IEC 9798-2:2008 Information technology. Security techniques. Entity authentication Mechanisms using symmetric encipherment algorithms
BS EN 726-1:1995 Identification card systems. Telecommunications. Integrated circuit(s) cards and terminals System overview
BS ISO/IEC 9798-3 : 1998 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
BS EN 30202-1:1993 Financial transaction cards. Security architecture of financial transaction systems using integrated circuit cards Card life cycle
BS EN 726-3:1996 Identification card systems. Telecommunications. Integrated circuit(s) cards and terminals Application independent card requirements

View more information
£232.00
Excluding VAT

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.