BS ISO/IEC 7816-8:2021
$189.07
Identification cards. Integrated circuit cards – Commands and mechanisms for security operations
Published By | Publication Date | Number of Pages |
BSI | 2021 | 46 |
This document specifies interindustry commands which can be used for security operations. This document also provides informative directives on how to construct security mechanisms with commands defined in ISO/IEC 7816-4 .
The choice and conditions of use of cryptographic mechanism in security operations can affect card exportability. The evaluation of the suitability of algorithms and protocols is outside the scope of this document. It does not cover the internal implementation within the card and/or the outside world.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
6 | Foreword |
7 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
10 | 4 Abbreviated terms |
11 | 5 Interindustry commands for security operations 5.1 General 5.2 Generate asymmetric key pair command |
16 | 5.3 Perform security operation command 5.3.1 General |
18 | 5.3.2 Compute cryptographic checksum operation |
19 | 5.3.3 Compute digital signature operation 5.3.4 Hash operation |
20 | 5.3.5 Verify cryptographic checksum operation 5.3.6 Verify digital signature operation |
21 | 5.3.7 Verify certificate operation |
22 | 5.3.8 Encipher operation 5.3.9 Decipher operation |
23 | Annex A (informative) Examples of operations related to digital signature |
29 | Annex B (informative) Examples of certificates interpreted by the card |
33 | Annex C (informative) Examples of asymmetric key transfer |
36 | Annex D (informative) Alternatives to achieve the reversible change of security context |
38 | Annex E (informative) Examples of uses for generate asymmetric key pair command |
44 | Bibliography |