{"id":344168,"date":"2024-10-20T00:10:05","date_gmt":"2024-10-20T00:10:05","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-15-30327554-dc\/"},"modified":"2024-10-25T23:31:08","modified_gmt":"2024-10-25T23:31:08","slug":"bsi-15-30327554-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-15-30327554-dc\/","title":{"rendered":"BSI 15\/30327554 DC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
10<\/td>\n | 1 Scope 2 Conformance 3 Normative references <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4 Terms and definitions 5 Conventions and notations 5.1 Concatenation 5.2 Hexadecimal numbers 6 Acronyms <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 7 General 8 Protocol Identifier (PID) 9 Primitives <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 9.1 Key agreement 9.1.1 Curve P-192 9.1.2 EC Key Pair Generation Primitive 9.1.3 EC Public key validation 9.1.4 ECDH secret value derivation Primitive 9.1.5 Random nonces <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 9.2 Key Derivation Functions 9.2.1 KDF for the SSE 9.2.2 KDF for the SCH 9.3 Key Usage <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 9.4 Key Confirmation 9.4.1 Key confirmation tag generation 9.4.2 Key confirmation tag verification 9.5 Data Encryption 9.5.1 Initial value of counter (IV) 9.5.2 Encryption <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 9.5.3 Decryption 9.6 Data Integrity 9.6.1 Protect data integrity 9.6.2 Check data integrity 9.7 Message Sequence Integrity 10 Data Conversions 10.1 Integer-to-Octet-String Conversion 10.2 Octet-String-to-Integer Conversion <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 10.3 Point-to-Octet-String Conversion 10.4 Octet-String-to-Point Conversion 11 SSE and SCH service invocation <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 11.1 Pre-requisites <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 11.2 Key Agreement 11.2.1 Sender (A) Transformation 11.2.2 Recipient (B) Transformation <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 11.3 Key Derivation 11.3.1 Sender (A) Transformation 11.3.2 Recipient (B) Transformation 11.4 Key Confirmation 11.4.1 Sender (A) Transformation <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 11.4.2 Recipient (B) Transformation 12 SCH data exchange <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 12.1 Preparation 12.2 Data Exchange 12.2.1 Send 12.2.2 Receive <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO\/IEC 13157-2. Information technology. Telecommunications and information exchange between systems. NFC Security. Part 2. NFC-SEC cryptography standard using ECDH and AES<\/b><\/p>\n |