{"id":344168,"date":"2024-10-20T00:10:05","date_gmt":"2024-10-20T00:10:05","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-15-30327554-dc\/"},"modified":"2024-10-25T23:31:08","modified_gmt":"2024-10-25T23:31:08","slug":"bsi-15-30327554-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-15-30327554-dc\/","title":{"rendered":"BSI 15\/30327554 DC"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
10<\/td>\n1 Scope
2 Conformance
3 Normative references <\/td>\n<\/tr>\n
11<\/td>\n4 Terms and definitions
5 Conventions and notations
5.1 Concatenation
5.2 Hexadecimal numbers
6 Acronyms <\/td>\n<\/tr>\n
12<\/td>\n7 General
8 Protocol Identifier (PID)
9 Primitives <\/td>\n<\/tr>\n
13<\/td>\n9.1 Key agreement
9.1.1 Curve P-192
9.1.2 EC Key Pair Generation Primitive
9.1.3 EC Public key validation
9.1.4 ECDH secret value derivation Primitive
9.1.5 Random nonces <\/td>\n<\/tr>\n
14<\/td>\n9.2 Key Derivation Functions
9.2.1 KDF for the SSE
9.2.2 KDF for the SCH
9.3 Key Usage <\/td>\n<\/tr>\n
15<\/td>\n9.4 Key Confirmation
9.4.1 Key confirmation tag generation
9.4.2 Key confirmation tag verification
9.5 Data Encryption
9.5.1 Initial value of counter (IV)
9.5.2 Encryption <\/td>\n<\/tr>\n
16<\/td>\n9.5.3 Decryption
9.6 Data Integrity
9.6.1 Protect data integrity
9.6.2 Check data integrity
9.7 Message Sequence Integrity
10 Data Conversions
10.1 Integer-to-Octet-String Conversion
10.2 Octet-String-to-Integer Conversion <\/td>\n<\/tr>\n
17<\/td>\n10.3 Point-to-Octet-String Conversion
10.4 Octet-String-to-Point Conversion
11 SSE and SCH service invocation <\/td>\n<\/tr>\n
18<\/td>\n11.1 Pre-requisites <\/td>\n<\/tr>\n
19<\/td>\n11.2 Key Agreement
11.2.1 Sender (A) Transformation
11.2.2 Recipient (B) Transformation <\/td>\n<\/tr>\n
20<\/td>\n11.3 Key Derivation
11.3.1 Sender (A) Transformation
11.3.2 Recipient (B) Transformation
11.4 Key Confirmation
11.4.1 Sender (A) Transformation <\/td>\n<\/tr>\n
21<\/td>\n11.4.2 Recipient (B) Transformation
12 SCH data exchange <\/td>\n<\/tr>\n
22<\/td>\n12.1 Preparation
12.2 Data Exchange
12.2.1 Send
12.2.2 Receive <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS ISO\/IEC 13157-2. Information technology. Telecommunications and information exchange between systems. NFC Security. Part 2. NFC-SEC cryptography standard using ECDH and AES<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2015<\/td>\n26<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":344174,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-344168","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/344168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/344174"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=344168"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=344168"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=344168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}