{"id":350085,"date":"2024-10-20T00:40:19","date_gmt":"2024-10-20T00:40:19","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-419212-52018\/"},"modified":"2024-10-26T00:25:03","modified_gmt":"2024-10-26T00:25:03","slug":"bs-en-419212-52018","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-419212-52018\/","title":{"rendered":"BS EN 419212-5:2018"},"content":{"rendered":"

This part of this series contains Identification, Authentication and Digital Signature (IAS) services in addition to the QSCD mechanisms already described in Part 1 to enable interoperability and usage for IAS services on a national or European level. It also specifies additional mechanisms like key decipherment, Client Server authentication, identity management and privacy related services.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
6<\/td>\nEuropean foreword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
8<\/td>\n1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations and notation
5 Additional Service Selection <\/td>\n<\/tr>\n
12<\/td>\n6 Client\/Server Authentication
6.1 General
6.2 Client\/Server protocols <\/td>\n<\/tr>\n
13<\/td>\n6.3 Steps preceding the client\/server authentication
6.4 Padding format
6.4.1 PKCS #1 v 1-5 Padding <\/td>\n<\/tr>\n
14<\/td>\n6.4.2 PKCS #1 V 2.x (PSS) Padding <\/td>\n<\/tr>\n
15<\/td>\n6.4.3 Building the DSI on ECDSA
6.5 Client\/Server protocol
6.5.1 General <\/td>\n<\/tr>\n
16<\/td>\n6.5.2 Step 1 \u2014 Read certificate <\/td>\n<\/tr>\n
17<\/td>\n6.5.3 Step 2 \u2014 Set signing key for client\/server internal authentication <\/td>\n<\/tr>\n
18<\/td>\n6.5.4 Step 3 \u2014 Internal authentication <\/td>\n<\/tr>\n
19<\/td>\n6.5.5 Client\/Server authentication execution flow <\/td>\n<\/tr>\n
21<\/td>\n6.5.6 Command data field for the client server authentication
7 Role Authentication
7.1 Role Authentication of the card <\/td>\n<\/tr>\n
22<\/td>\n7.2 Role Authentication of the server
7.3 Symmetrical external authentication
7.3.1 Protocol <\/td>\n<\/tr>\n
25<\/td>\n7.3.2 Description of the cryptographic mechanisms <\/td>\n<\/tr>\n
26<\/td>\n7.3.3 Role description
7.4 Asymmetric external authentication
7.4.1 Protocol based on RSA <\/td>\n<\/tr>\n
29<\/td>\n8 Symmetric key transmission between a remote server and the ICC
8.1 Steps preceding the key transport
8.2 Key encryption with RSA
8.2.1 General <\/td>\n<\/tr>\n
30<\/td>\n8.2.2 PKCS#1 v1.5 padding
8.2.3 OAEP padding <\/td>\n<\/tr>\n
31<\/td>\n8.2.4 Execution flow <\/td>\n<\/tr>\n
33<\/td>\n8.3 Diffie-Hellman key exchange for key encipherment
8.3.1 General <\/td>\n<\/tr>\n
35<\/td>\n8.3.2 Execution flow <\/td>\n<\/tr>\n
36<\/td>\n9 Signature verification
9.1 General <\/td>\n<\/tr>\n
37<\/td>\n9.2 Signature verification execution flow
9.2.1 General
9.2.2 Step 1: Receive Hash <\/td>\n<\/tr>\n
38<\/td>\n9.2.3 Step 2: Select verification key <\/td>\n<\/tr>\n
39<\/td>\n9.2.4 Step 3: Verify digital signature
10 Certificates for additional services
10.1 File structure <\/td>\n<\/tr>\n
40<\/td>\n10.2 File structure
10.3 EF.C_X509.CH.DS
10.4 EF.C.CH.AUT <\/td>\n<\/tr>\n
41<\/td>\n10.5 EF.C.CH.KE
10.6 Reading Certificates and the public key of CAs
11 APDU data structures
11.1 Algorithm Identifiers
11.2 General <\/td>\n<\/tr>\n
42<\/td>\n11.3 CRTs
11.3.1 General
11.3.2 CRT DST for selection of ICC\u2019s private client\/server auth. key
11.3.3 CRT AT for selection of ICC\u2019s private client\/server auth. key
11.3.4 CRT CT for selection of ICC\u2019s private key <\/td>\n<\/tr>\n
43<\/td>\n11.3.5 CRT DST for selection of IFD\u2019s public key (signature verification) <\/td>\n<\/tr>\n
44<\/td>\nAnnex A (informative) Security Service Descriptor Templates <\/td>\n<\/tr>\n
49<\/td>\nAnnex B (informative) Example of DF.CIA <\/td>\n<\/tr>\n
56<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services – Trusted eService<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2018<\/td>\n58<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":350092,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[693,2641],"product_tag":[],"class_list":{"0":"post-350085","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-240-15","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/350085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/350092"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=350085"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=350085"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=350085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}