BS EN 419212-5:2018
$198.66
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services – Trusted eService
Published By | Publication Date | Number of Pages |
BSI | 2018 | 58 |
This part of this series contains Identification, Authentication and Digital Signature (IAS) services in addition to the QSCD mechanisms already described in Part 1 to enable interoperability and usage for IAS services on a national or European level. It also specifies additional mechanisms like key decipherment, Client Server authentication, identity management and privacy related services.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
6 | European foreword |
7 | Introduction |
8 | 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations and notation 5 Additional Service Selection |
12 | 6 Client/Server Authentication 6.1 General 6.2 Client/Server protocols |
13 | 6.3 Steps preceding the client/server authentication 6.4 Padding format 6.4.1 PKCS #1 v 1-5 Padding |
14 | 6.4.2 PKCS #1 V 2.x (PSS) Padding |
15 | 6.4.3 Building the DSI on ECDSA 6.5 Client/Server protocol 6.5.1 General |
16 | 6.5.2 Step 1 ā Read certificate |
17 | 6.5.3 Step 2 ā Set signing key for client/server internal authentication |
18 | 6.5.4 Step 3 ā Internal authentication |
19 | 6.5.5 Client/Server authentication execution flow |
21 | 6.5.6 Command data field for the client server authentication 7 Role Authentication 7.1 Role Authentication of the card |
22 | 7.2 Role Authentication of the server 7.3 Symmetrical external authentication 7.3.1 Protocol |
25 | 7.3.2 Description of the cryptographic mechanisms |
26 | 7.3.3 Role description 7.4 Asymmetric external authentication 7.4.1 Protocol based on RSA |
29 | 8 Symmetric key transmission between a remote server and the ICC 8.1 Steps preceding the key transport 8.2 Key encryption with RSA 8.2.1 General |
30 | 8.2.2 PKCS#1 v1.5 padding 8.2.3 OAEP padding |
31 | 8.2.4 Execution flow |
33 | 8.3 Diffie-Hellman key exchange for key encipherment 8.3.1 General |
35 | 8.3.2 Execution flow |
36 | 9 Signature verification 9.1 General |
37 | 9.2 Signature verification execution flow 9.2.1 General 9.2.2 Step 1: Receive Hash |
38 | 9.2.3 Step 2: Select verification key |
39 | 9.2.4 Step 3: Verify digital signature 10 Certificates for additional services 10.1 File structure |
40 | 10.2 File structure 10.3 EF.C_X509.CH.DS 10.4 EF.C.CH.AUT |
41 | 10.5 EF.C.CH.KE 10.6 Reading Certificates and the public key of CAs 11 APDU data structures 11.1 Algorithm Identifiers 11.2 General |
42 | 11.3 CRTs 11.3.1 General 11.3.2 CRT DST for selection of ICCās private client/server auth. key 11.3.3 CRT AT for selection of ICCās private client/server auth. key 11.3.4 CRT CT for selection of ICCās private key |
43 | 11.3.5 CRT DST for selection of IFDās public key (signature verification) |
44 | Annex A (informative) Security Service Descriptor Templates |
49 | Annex B (informative) Example of DF.CIA |
56 | Bibliography |