BSI 15/30327562 DC:2015 Edition
$13.70
BS ISO/IEC 13157-3. Information technology. Telecommunications and information exchange between systems. NFC Security. Part 3. NFC-SEC cryptography standard using ECDH-256 and AESGCM
Published By | Publication Date | Number of Pages |
BSI | 2015 | 19 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
10 | 1 Scope 2 Conformance 3 Normative references |
11 | 4 Terms and definitions 5 Conventions and notations 6 Acronyms 7 General 8 Protocol Identifier (PID) 9 Primitives |
12 | 9.1 Key agreement 9.1.1 Curve P- 256 9.1.2 EC Key Pair Generation Primitive 9.1.3 EC Public key validation 9.1.4 ECDH secret value derivation Primitive 9.1.5 Random nonces 9.2 Key Derivation Functions |
13 | 9.2.1 KDF for the SSE 9.2.2 KDF for the SCH 9.3 Key Usage 9.4 Key Confirmation |
14 | 9.4.1 Key confirmation tag generation 9.4.2 Key confirmation tag verification 9.5 Data Authenticated Encryption 9.5.1 Starting Variable (StartVar) 9.5.2 Additional Authenticated Data (AAD) 9.5.3 Generation-Encryption 9.5.4 Decryption-Verification |
15 | 9.6 Data Integrity 9.7 Message Sequence Integrity 10 Data Conversions 11 SSE and SCH service invocation 12 SCH data exchange 12.1 Preparation |
16 | 12.2 Data Exchange 12.2.1 Send 12.2.2 Receive |