Shopping Cart

No products in the cart.

BS EN 419212-5:2018

$198.66

Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services – Trusted eService

Published By Publication Date Number of Pages
BSI 2018 58
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weā€™re here to assist you 24/7.
Email:[email protected]

This part of this series contains Identification, Authentication and Digital Signature (IAS) services in addition to the QSCD mechanisms already described in Part 1 to enable interoperability and usage for IAS services on a national or European level. It also specifies additional mechanisms like key decipherment, Client Server authentication, identity management and privacy related services.

PDF Catalog

PDF Pages PDF Title
2 National foreword
6 European foreword
7 Introduction
8 1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations and notation
5 Additional Service Selection
12 6 Client/Server Authentication
6.1 General
6.2 Client/Server protocols
13 6.3 Steps preceding the client/server authentication
6.4 Padding format
6.4.1 PKCS #1 v 1-5 Padding
14 6.4.2 PKCS #1 V 2.x (PSS) Padding
15 6.4.3 Building the DSI on ECDSA
6.5 Client/Server protocol
6.5.1 General
16 6.5.2 Step 1 ā€” Read certificate
17 6.5.3 Step 2 ā€” Set signing key for client/server internal authentication
18 6.5.4 Step 3 ā€” Internal authentication
19 6.5.5 Client/Server authentication execution flow
21 6.5.6 Command data field for the client server authentication
7 Role Authentication
7.1 Role Authentication of the card
22 7.2 Role Authentication of the server
7.3 Symmetrical external authentication
7.3.1 Protocol
25 7.3.2 Description of the cryptographic mechanisms
26 7.3.3 Role description
7.4 Asymmetric external authentication
7.4.1 Protocol based on RSA
29 8 Symmetric key transmission between a remote server and the ICC
8.1 Steps preceding the key transport
8.2 Key encryption with RSA
8.2.1 General
30 8.2.2 PKCS#1 v1.5 padding
8.2.3 OAEP padding
31 8.2.4 Execution flow
33 8.3 Diffie-Hellman key exchange for key encipherment
8.3.1 General
35 8.3.2 Execution flow
36 9 Signature verification
9.1 General
37 9.2 Signature verification execution flow
9.2.1 General
9.2.2 Step 1: Receive Hash
38 9.2.3 Step 2: Select verification key
39 9.2.4 Step 3: Verify digital signature
10 Certificates for additional services
10.1 File structure
40 10.2 File structure
10.3 EF.C_X509.CH.DS
10.4 EF.C.CH.AUT
41 10.5 EF.C.CH.KE
10.6 Reading Certificates and the public key of CAs
11 APDU data structures
11.1 Algorithm Identifiers
11.2 General
42 11.3 CRTs
11.3.1 General
11.3.2 CRT DST for selection of ICCā€™s private client/server auth. key
11.3.3 CRT AT for selection of ICCā€™s private client/server auth. key
11.3.4 CRT CT for selection of ICCā€™s private key
43 11.3.5 CRT DST for selection of IFDā€™s public key (signature verification)
44 Annex A (informative) Security Service Descriptor Templates
49 Annex B (informative) Example of DF.CIA
56 Bibliography
BS EN 419212-5:2018
$198.66