• There are no items in your cart

12/30255296 DC : DRAFT MAR 2012

Superseded
Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by
superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES
Superseded date

12-31-2014

Published date

11-23-2012

Foreword
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations and notation
5 Additional Service Selection
6 Client/Server Authentication
7 Role Authentication
8 Symmetric key transmission between a remote
   server and the ICC
9 Signature verification
10 Certificates for additional services
11 Privacy Context functions
12 APDU data structures
Annex A (normative) - Security Service Descriptor
        Templates
Annex B (informative) - Key and signature formats
        for elliptic curves over prime fields GF(p)
Annex C (informative) - Security environments
Annex D (normative) - Algorithm Identifiers - Coding
        and specification
Annex E (informative) - Example of DF.CIA
Bibliography

BS EN 14890-2

Committee
IST/17
DocumentType
Draft
PublisherName
British Standards Institution
Status
Superseded
SupersededBy

Standards Relationship
PREN 14890-2 : DRAFT 2012 Identical

ISO/IEC 7816-8:2016 Identification cards Integrated circuit cards Part 8: Commands and mechanisms for security operations
ISO/IEC 7816-9:2004 Identification cards Integrated circuit cards Part 9: Commands for card management
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
ISO/IEC 7816-4:2013 Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange
ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
ISO/IEC 15946-5:2017 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation
FIPS PUB 180 : 2002 SECURE HASH STANDARD

View more information
Sorry this product is not available in your region.

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.