{"id":344173,"date":"2024-10-20T00:10:07","date_gmt":"2024-10-20T00:10:07","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-15-30327565-dc\/"},"modified":"2024-10-25T23:31:08","modified_gmt":"2024-10-25T23:31:08","slug":"bsi-15-30327565-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-15-30327565-dc\/","title":{"rendered":"BSI 15\/30327565 DC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
10<\/td>\n | 1 Scope 2 Conformance 3 Normative references <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4 Terms and definitions <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5 Conventions and notations 6 Acronyms <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 7 General <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 8 Fields and PDUs for NEAU-A 8.1 Protocol Identifier (PID) 8.2 NFC-SEC-PDUs <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 8.3 TTP involving 8.3.1 TTP policy and field 8.3.2 TTP policy negotiation <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 8.4 Entity identifiers 8.5 Cert field 8.6 Res field <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 9 Primitives 9.1 General requirements <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 9.2 Entity authentication 9.2.1 Mechanisms <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 9.2.2 EC curve 9.2.3 ECDSA 9.2.3.1 Overview 9.2.3.2 Digital signature generation 9.2.3.2.1 Digital signature generation of SigA in VFY_REQ 9.2.3.2.2 Digital signature generation of SigB in ACT_RES 9.2.3.2.3 Digital signature generation of SigTTP in TAEP_RES <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 9.2.3.3 Digital signature verification 9.2.3.3.1 Digital signature verification of SigA in VFY_REQ 9.2.3.3.2 Digital signature verification of SigB in ACT_RES 9.2.3.3.3 Digital signature verification of SigTTP in TAEP_RES 9.2.3.3.4 Digital signature verification of SigTTP in VFY _REQ <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 9.2.4 Certificate validation 9.2.4.1 TTP involved 9.2.4.1.1 Certificate validation process 9.2.4.1.2 Resx generation 9.2.4.1.3 Resx verification 9.2.4.1.3.1 Resx verification of Sender (A) in VFY_REQ 9.2.4.1.3.2 Resx verification of Recipient (B) in TAEP_RES 9.2.4.2 TTP not involved 9.3 Key agreement <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 9.4 Key confirmation 9.5 Key Derivation Function (KDF) 10 NEAU-A mechanism 10.1 Entity authentication involving a TTP 10.1.1 Protocol overview 10.1.2 Preparation <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 10.1.3 Sender (A) transformation <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 10.1.4 Recipient (B) transformation <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 10.1.5 TTP transformation 10.2 Entity authentication without involving a TTP 10.2.1 Protocol overview <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 10.2.2 Preparation 10.2.3 Sender (A) transformation <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 10.2.4 Recipient (B) transformation <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 10.3 Key derivation 10.3.1 Sender (A) 10.3.2 Recipient (B) <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 11 Data Authenticated Encryption in SCH <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO\/IEC 13157-4. Information technology. Telecommunications and information exchange between systems. NFC Security. Part 4. NFC-SEC entity authentication and key agreement using asymmetric cryptography<\/b><\/p>\n |