M00016283
New product
IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PART 8: COMMANDS FOR SECURITY OPERATIONS
British Standards Institution
In stock
Warning: Last items in stock!
Availability date: 11/05/2021
Foreword<br>Introduction<br>1 Scope<br>2 Normative references<br>3 Terms and definitions<br>4 Abbreviations and notation<br>5 Interindustry commands for cryptographic operations<br> 5.1 GENERATE ASYMMETRIC KEY PAIR command<br> 5.2 PERFORM SECURITY OPERATION command<br> 5.3 COMPUTE CRYPTOGRAPHIC CHECKSUM operation<br> 5.4 COMPUTE DIGITAL SIGNATURE operation<br> 5.5 HASH operation<br> 5.6 VERIFY CRYPTOGRAPHIC CHECKSUM operation<br> 5.7 VERIFY DIGITAL SIGNATURE operation<br> 5.8 VERIFY CERTIFICATE operation<br> 5.9 ENCIPHER operation<br> 5.10 DECIPHER operation<br>Annex A (informative) - Examples of operations related<br> to digital signature<br>Annex B (informative) - Examples of certificates interpreted<br> by the card<br>Annex C (informative) - Examples of asymmetric key import/export<br>Bibliography
States interindustry commands for integrated circuit cards (either with contacts or without contacts) that may be used for cryptographic operations.
Published | |
Document Type | Standard |
Status | Current |
Publisher | British Standards Institution |
Pages | |
ISBN | |
Committee | IST/17 |
Supersedes |
|