{"id":344169,"date":"2024-10-20T00:10:06","date_gmt":"2024-10-20T00:10:06","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-15-30327562-dc\/"},"modified":"2024-10-25T23:31:08","modified_gmt":"2024-10-25T23:31:08","slug":"bsi-15-30327562-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-15-30327562-dc\/","title":{"rendered":"BSI 15\/30327562 DC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
10<\/td>\n | 1 Scope 2 Conformance 3 Normative references <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4 Terms and definitions 5 Conventions and notations 6 Acronyms 7 General 8 Protocol Identifier (PID) 9 Primitives <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 9.1 Key agreement 9.1.1 Curve P- 256 9.1.2 EC Key Pair Generation Primitive 9.1.3 EC Public key validation 9.1.4 ECDH secret value derivation Primitive 9.1.5 Random nonces 9.2 Key Derivation Functions <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 9.2.1 KDF for the SSE 9.2.2 KDF for the SCH 9.3 Key Usage 9.4 Key Confirmation <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 9.4.1 Key confirmation tag generation 9.4.2 Key confirmation tag verification 9.5 Data Authenticated Encryption 9.5.1 Starting Variable (StartVar) 9.5.2 Additional Authenticated Data (AAD) 9.5.3 Generation-Encryption 9.5.4 Decryption-Verification <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 9.6 Data Integrity 9.7 Message Sequence Integrity 10 Data Conversions 11 SSE and SCH service invocation 12 SCH data exchange 12.1 Preparation <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 12.2 Data Exchange 12.2.1 Send 12.2.2 Receive <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO\/IEC 13157-3. Information technology. Telecommunications and information exchange between systems. NFC Security. Part 3. NFC-SEC cryptography standard using ECDH-256 and AESGCM<\/b><\/p>\n |