BS ISO/IEC 7816-8:2021+A1:2023:2024 Edition
$215.11
Identification cards. Integrated circuit cards – Commands and mechanisms for security operations
Published By | Publication Date | Number of Pages |
BSI | 2024 | 88 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
6 | Foreword |
7 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
10 | 4 Abbreviated terms |
11 | Blank Page |
12 | Blank Page |
13 | Blank Page |
14 | 5 Interindustry commands for security operations 5.1 General 5.2 Generate asymmetric key pair command |
18 | 5.3 Perform security operation command 5.3.1 General |
33 | Blank Page |
36 | 5.3.2 Compute cryptographic checksum operation 5.3.3 Compute digital signature operation 5.3.4 Hash operation |
37 | 5.3.5 Verify cryptographic checksum operation 5.3.6 Verify digital signature operation |
38 | Blank Page |
39 | 5.3.7 Verify certificate operation |
44 | Annex A (informative) Examples of operations related to digital signature |
50 | Blank Page |
51 | Annex B (informative) Examples of certificates interpreted by the card |
52 | Blank Page |
65 | Annex C (informative) Examples of asymmetric key transfer |
68 | Annex D (informative) Alternatives to achieve the reversible change of security context |
70 | Annex E (informative) Examples of uses for generate asymmetric key pair command |
87 | Bibliography |