{"id":453808,"date":"2024-10-20T09:32:13","date_gmt":"2024-10-20T09:32:13","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-7816-82021a12023\/"},"modified":"2024-10-26T17:41:53","modified_gmt":"2024-10-26T17:41:53","slug":"bs-iso-iec-7816-82021a12023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-7816-82021a12023\/","title":{"rendered":"BS ISO\/IEC 7816-8:2021+A1:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Blank Page <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | Blank Page <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | Blank Page <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5 Interindustry commands for security operations 5.1 General 5.2 Generate asymmetric key pair command <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.3 Perform security operation command 5.3.1 General <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Blank Page <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 5.3.2 Compute cryptographic checksum operation 5.3.3 Compute digital signature operation 5.3.4 Hash operation <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 5.3.5 Verify cryptographic checksum operation 5.3.6 Verify digital signature operation <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Blank Page <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 5.3.7 Verify certificate operation <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | Annex A (informative) Examples of operations related to digital signature <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | Blank Page <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | Annex B (informative) Examples of certificates interpreted by the card <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | Blank Page <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | Annex C (informative) Examples of asymmetric key transfer <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | Annex D (informative) Alternatives to achieve the reversible change of security context <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | Annex E (informative) Examples of uses for generate asymmetric key pair command <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Identification cards. Integrated circuit cards – Commands and mechanisms for security operations<\/b><\/p>\n |