• There are no items in your cart

ECMA 386 : 3ED 2015

Current

Current

The latest, up-to-date edition.

NFC-SEC-01: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES

Published date

01-12-2013

1 Scope
2 Conformance
3 Normative references
4 Terms and definitions
5 Conventions and notations
6 Acronyms
7 General
8 Protocol Identifier (PID)
9 Primitives
10 Data Conversions
11 SSE and SCH service invocation
12 SCH data exchange
Annex A (normative) - AES-XCBC-PRF-128 and
        AES-XCBC-MAC-96 algorithms
Annex B (normative) - Fields sizes
Annex C (informative) - Informative references

Describes the message contents and the cryptographic methods for PID 01.

DocumentType
Standard
PublisherName
European Computer Manufacturers Association
Status
Current

ECMA 415 : 1ED 2016 NFC-SEC TEST METHODS
ISO/IEC 22425:2017 Information technology — Telecommunications and information exchange between systems — NFC-SEC Test Methods
ECMA 385 : 4ED 2015 NFC-SEC: NFCIP-1 SECURITY SERVICES AND PROTOCOL
ISO/IEC 13157-1:2014 Information technology Telecommunications and information exchange between systems NFC Security Part 1: NFC-SEC NFCIP-1 security services and protocol
BS ISO/IEC 22425:2017 Information technology. Telecommunications and information exchange between systems. NFC-SEC Test Methods
ECMA 410 : 3ED 2017 NFC-SEC-03: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING ASYMMETRIC CRYPTOGRAPHY
ECMA 409 : 2ED 2015 NFC-SEC-02: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH-256 AND AES-GCM
13/30288455 DC : 0 BS ISO/IEC 13157-1 - INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - NFC SECURITY - PART 1: NFC-SEC NFCIP-1 SECURITY SERVICES AND PROTOCOL
ECMA 411 : 3ED 2017 NFC-SEC-04: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING SYMMETRIC CRYPTOGRAPHY

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ECMA 340 : 3ED 2013 NEAR FIELD COMMUNICATION - INTERFACE AND PROTOCOL (NFCIP-1)
ECMA 385 : 4ED 2015 NFC-SEC: NFCIP-1 SECURITY SERVICES AND PROTOCOL
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

View more information
Sorry this product is not available in your region.

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.