{"id":350085,"date":"2024-10-20T00:40:19","date_gmt":"2024-10-20T00:40:19","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-419212-52018\/"},"modified":"2024-10-26T00:25:03","modified_gmt":"2024-10-26T00:25:03","slug":"bs-en-419212-52018","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-419212-52018\/","title":{"rendered":"BS EN 419212-5:2018"},"content":{"rendered":"
This part of this series contains Identification, Authentication and Digital Signature (IAS) services in addition to the QSCD mechanisms already described in Part 1 to enable interoperability and usage for IAS services on a national or European level. It also specifies additional mechanisms like key decipherment, Client Server authentication, identity management and privacy related services.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | European foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations and notation 5 Additional Service Selection <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 6 Client\/Server Authentication 6.1 General 6.2 Client\/Server protocols <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6.3 Steps preceding the client\/server authentication 6.4 Padding format 6.4.1 PKCS #1 v 1-5 Padding <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6.4.2 PKCS #1 V 2.x (PSS) Padding <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6.4.3 Building the DSI on ECDSA 6.5 Client\/Server protocol 6.5.1 General <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.5.2 Step 1 \u2014 Read certificate <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.5.3 Step 2 \u2014 Set signing key for client\/server internal authentication <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.5.4 Step 3 \u2014 Internal authentication <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.5.5 Client\/Server authentication execution flow <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.5.6 Command data field for the client server authentication 7 Role Authentication 7.1 Role Authentication of the card <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 7.2 Role Authentication of the server 7.3 Symmetrical external authentication 7.3.1 Protocol <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 7.3.2 Description of the cryptographic mechanisms <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 7.3.3 Role description 7.4 Asymmetric external authentication 7.4.1 Protocol based on RSA <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 8 Symmetric key transmission between a remote server and the ICC 8.1 Steps preceding the key transport 8.2 Key encryption with RSA 8.2.1 General <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 8.2.2 PKCS#1 v1.5 padding 8.2.3 OAEP padding <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 8.2.4 Execution flow <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 8.3 Diffie-Hellman key exchange for key encipherment 8.3.1 General <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 8.3.2 Execution flow <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 9 Signature verification 9.1 General <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 9.2 Signature verification execution flow 9.2.1 General 9.2.2 Step 1: Receive Hash <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 9.2.3 Step 2: Select verification key <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 9.2.4 Step 3: Verify digital signature 10 Certificates for additional services 10.1 File structure <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 10.2 File structure 10.3 EF.C_X509.CH.DS 10.4 EF.C.CH.AUT <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 10.5 EF.C.CH.KE 10.6 Reading Certificates and the public key of CAs 11 APDU data structures 11.1 Algorithm Identifiers 11.2 General <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 11.3 CRTs 11.3.1 General 11.3.2 CRT DST for selection of ICC\u2019s private client\/server auth. key 11.3.3 CRT AT for selection of ICC\u2019s private client\/server auth. key 11.3.4 CRT CT for selection of ICC\u2019s private key <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 11.3.5 CRT DST for selection of IFD\u2019s public key (signature verification) <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | Annex A (informative) Security Service Descriptor Templates <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | Annex B (informative) Example of DF.CIA <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services – Trusted eService<\/b><\/p>\n |