• There are no items in your cart

UNI EN 726-2 : 1996

Current

Current

The latest, up-to-date edition.

IDENTIFICATION CARD SYSTEMS - TELECOMMUNICATIONS INTEGRATED CIRCUIT(S) CARDS AND TERMINALS - SECURITY FRAMEWORK

Published date

09-30-1996

Foreword
1 Scope
2 Normative references
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4 Reference model
5 General security approach
5.1 Methodology
5.2 Identifying security requirements
5.2.1 Manufacturing of IC and IC card (phase 1)
5.2.2 Card preparation phase (phase 2)
5.2.3 Application preparation (phase 3)
5.2.4 Usage phase (phase 4)
5.2.5 Termination of use (phase 5)
5.3 General security services
5.3.1 Access control service
5.3.2 Authentication service
5.3.3 Confidentiality service
5.3.4 Integrity service
5.3.5 Non-repudiation service
5.3.6 Audit service
5.4 General security mechanisms
6 Application independent security
6.1 Application independent security requirements
6.1.1 Manufacturing of IC and IC card (phase 1)
6.1.2 Card preparation phase ([phase 2)
6.1.3 Application preparation phase (phase 3)
6.1.4 Usage phase (phase 4)
6.1.5 Termination of use (phase 5)
6.2 Application of independent security services
6.3 Application independent security mechanisms
6.3.1 Access control information
6.3.2 PIN mechanism
6.3.3 Internal authentication
6.3.4 External authentication
6.3.5 Protected mode
6.3.6 Stamped mode
6.3.7 Load key file
7 Application dependent security
7.1 Methodology
7.2 Flowchart
Annex
A (normative) Usage of TESA-7 algorithm in
        telecommunication applications in accordance with
        EN 726
A.1 Introduction
A.2 General specification of external interfaces for
        TESA-7 modes:
A.2.1 Key Establishment Function
A.2.2 Authentication function
A.2.3 Mac mode
A.2.4 Inverse Key Establishment function
A.2.5 Key diversification mode
A.3 Usage of TESA-7 algorithm
A.3.1 INTERNAL AUTHENTICATION/VERIFY CRYPTOGRAM
A.3.2 EXTERNAL AUTHENTICATION/COMPUTE CRYPTOGRAM
A.3.3 Protected mode/COMPUTE MAC (SM) or DECREASE (SM)
A.3.4 Stamped mode/VERIFY MAC or INCREASE (SM) or
        UPDATE (SM)
A.3.5 COMPUTE LOAD KEY
A.3.6 LOAD KEY FILE
A.3.7 Diversify keyset

Specifies a security framework for telecommunication use of Integrated Circuit(s) (IC) cards. Describes: the implementation of the general security approach to the application of independent IC card; a general security approach that leads to a methodology, different card phases for identifying security requirements and a description of security services that can be offered by the IC card; the implementation of the general security approach to applications using IC cards (the result is a methodology that is used to design the set of security mechanisms for specific applications).

Committee
CT 500
DocumentType
Standard
PublisherName
Ente Nazionale Italiano di Unificazione (UNI)
Status
Current

Standards Relationship
DIN EN 726-2:1996-08 Identical
NEN EN 726-2 : 1996 Identical
NBN EN 726-2 : 1996 Identical
EN 726-2:1995 Identical
NF EN 726-2 : 1996 Identical
NS EN 726-2 : 1ED 1996 Identical
I.S. EN 726-2:1996 Identical
UNE-EN 726-2:1996 Identical
BS EN 726-2:1996 Identical

View more information
Sorry this product is not available in your region.

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.