欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ECMA 411-2015 NFC-SEC-04 NFC-SEC Entity Authentication and Key Agreement using Symmetric Cryptography (2nd Edition).pdf

    • 资源ID:704844       资源大小:356.35KB        全文页数:18页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ECMA 411-2015 NFC-SEC-04 NFC-SEC Entity Authentication and Key Agreement using Symmetric Cryptography (2nd Edition).pdf

    1、 Reference numberECMA-123:2009Ecma International 2009ECMA-411 2ndEdition / June 2015 NFC-SEC-04: NFC-SEC Entity Authentication and Key Agreement using Symmetric Cryptography COPYRIGHT PROTECTED DOCUMENT Ecma International 2015 Ecma International 2015 iContents Page 1 Scope 1 2 Conformance . 1 3 Norm

    2、ative references 1 4 Terms and definitions . 2 5 Conventions and notations 2 6 Acronyms . 3 7 General . 3 8 Fields and PDUs for NEAU-S . 4 8.1 Protocol Identifier (PID) 4 8.2 NFC-SEC-PDUs 4 8.3 Entity identifiers 4 9 Primitives . 5 9.1 General requirements . 5 9.2 Entity authentication . 6 9.2.1 Mec

    3、hanism . 6 9.2.2 AES . 6 9.2.3 Modes of operation . 6 9.2.4 Message Authentication Code (MAC) . 6 9.3 Key agreement . 6 9.4 Key confirmation . 6 9.4.1 Overview . 6 9.4.2 Key confirmation tag generation . 6 9.4.3 Key confirmation tag verification 6 9.5 Key Derivation Function (KDF) 7 9.5.1 Overview .

    4、 7 9.5.2 KDF for MKA and KEIA . 7 9.5.3 KDF for the shared secret Z . 7 9.5.4 KDF for the SSE and SCH . 7 9.6 Data authenticated encryption during authentication . 8 9.6.1 Initial value (IV) 8 9.6.2 Additional Authenticated Data (AAD) 8 9.6.3 NEAU-S payload encryption and MAC generation 8 9.6.4 NEAU

    5、-S payload decryption and MAC verification 8 10 NEAU-S mechanism 9 10.1 Protocol overview 9 10.2 Preparation . 9 10.3 Sender (A) transformation 9 10.4 Recipient (B) transformation 10 11 Data Authenticated Encryption in SCH . 11 ii Ecma International 2015Introduction The NFC Security series of standa

    6、rds comprise a common services and protocol Standard and NFC-SEC cryptography standards. This NFC-SEC cryptography Standard specifies an NFC Entity Authentication (NEAU) mechanism that uses the symmetric cryptographic algorithm (NEAU-S) for mutual authentication of two NFC entities. This Standard ad

    7、dresses entity authentication of two NFC entities possessing a Pre-Shared Authentication Key (PSAK) during the key agreement and confirmation for the Shared Secret Service (SSE) and Secure Channel Service (SCH). This Standard adds entity authentication to the services provided by ISO/IEC 13157-3 (EC

    8、MA-409) NFC-SEC-02. This 2ndedition refers to the latest standards and the StarVar generation method for IV in NFC-SEC-02. This Ecma Standard has been adopted by the General Assembly of June 2015. Ecma International 2015 iii“COPYRIGHT NOTICE 2015 Ecma International This document may be copied, publi

    9、shed and distributed to others, and certain derivative works of it may be prepared, copied, published, and distributed, in whole or in part, provided that the above copyright notice and this Copyright License and Disclaimer are included on all such copies and derivative works. The only derivative wo

    10、rks that are permissible under this Copyright License and Disclaimer are: (i) works which incorporate all or portion of this document for the purpose of providing commentary or explanation (such as an annotated version of the document), (ii) works which incorporate all or portion of this document fo

    11、r the purpose of incorporating features that provide accessibility, (iii) translations of this document into languages other than English and into different formats and (iv) works by making use of this specification in standard conformant products by implementing (e.g. by copy and paste wholly or pa

    12、rtly) the functionality therein. However, the content of this document itself may not be modified in any way, including by removing the copyright notice or references to Ecma International, except as required to translate it into languages other than English or into a different format. The official

    13、version of an Ecma International document is the English language version on the Ecma International website. In the event of discrepancies between a translated version and the official version, the official version shall govern. The limited permissions granted above are perpetual and will not be rev

    14、oked by Ecma International or its successors or assigns. This document and the information contained herein is provided on an “AS IS“ basis and ECMA INTERNATIONAL DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT I

    15、NFRINGE ANY OWNERSHIP RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.“ iv Ecma International 2015NFC-SEC-04: NFC-SEC Entity Authentication and Key Agreement using Symmetric Cryptography 1 Scope This Standard specifies the message contents and the cryptographi

    16、c mechanisms for PID 04. This Standard specifies key agreement and confirmation mechanisms providing mutual authentication, using symmetric cryptography. NOTE This Standard adds entity authentication to the services provided by ISO/IEC 13157-3 (ECMA-409) NFC-SEC-02. 2 Conformance Conformant implemen

    17、tations employ the security mechanisms specified in this NFC-SEC cryptography Standard (identified by PID 04) and conform to ISO/IEC 13157-1 (ECMA-385). The NFC-SEC security services shall be established through the protocol specified in ISO/IEC 13157-1 (ECMA-385) and the mechanisms specified in thi

    18、s Standard. 3 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. ISO/IEC 7498-1

    19、:1994, Information technology - Open Systems Interconnection - Basic Reference Model: The Basic Model ISO/IEC 9798-1:2010, Information technology - Security techniques - Entity authentication - Part 1: General ISO/IEC 9798-2:2008, Information technology - Security techniques - Entity authentication

    20、- Part 2: Mechanisms using symmetric encipherment algorithms ISO/IEC 11770-1:2010, Information technology - Security techniques - Key management - Part 1: Framework ISO/IEC 11770-2:2008, Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques ISO

    21、/IEC 11770-3, Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques ISO/IEC 13157-1, Information technology - Telecommunications and information exchange between systems - NFC Security - Part 1: NFC-SEC NFCIP-1 security services and protocol (

    22、ECMA-385) ISO/IEC 13157-2, Information technology - Telecommunications and information exchange between systems - NFC Security - Part 2: NFC-SEC cryptography standard using ECDH and AES (ECMA-386) Ecma International 2015 1ISO/IEC 13157-3, Information technology - Telecommunications and information e

    23、xchange between systems - NFC Security - Part 3: NFC-SEC Cryptography Standard using ECDH-256 and AES-GCM (ECMA-409) ISO/IEC 14443-3, Identification cards - Contactless integrated circuit cards - Proximity cards - Part 3: Initialization and anticollision ISO/IEC 18031:2011, Information technology -

    24、Security techniques - Random bit generation ISO/IEC 18031:2011/Cor.1:2014, Information technology - Security techniques - Random bit generation - Technical Corrigendum 1 ISO/IEC 18033-3:2010, Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers ISO/IEC 18092,

    25、Information technology - Telecommunications and information exchange between systems - Near Field Communication - Interface and Protocol (NFCIP-1) (ECMA-340) ISO/IEC 19772:2009, Information technology - Security techniques - Authenticated encryption ISO/IEC 19772:2009/Cor.1:2014, Information technol

    26、ogy - Security techniques - Authenticated encryption - Technical Corrigendum 1 4 Terms and definitions Clause 4 of ISO/IEC 13157-3 (ECMA-409) applies. Additionally, the following terms and definitions apply. 4.1 entity authentication corroboration that an entity is the one claimed ISO/IEC 9798-1: 20

    27、10 4.2 n-entity-title a name that is used to identify unambiguously an n-entity ISO/IEC 7498-1: 1994 4.3 symmetric cryptography (symmetric cryptographic technique) cryptographic technique that uses the same secret key for both the originators and the recipients transformation ISO/IEC 9798-1: 2010 5

    28、Conventions and notations Clause 5 of ISO/IEC 13157-3 (ECMA-409) applies. Additionally, the following conversions and notations following apply. exclusive OR For any message field “F”, F denotes the value placed in the field upon sending, F the value upon receipt. 2 Ecma International 20156 Acronyms

    29、 Clause 6 of ISO/IEC 13157-3 (ECMA-409) applies. Additionally, the following acronyms apply. KEIA Encryption and Integrity Key in Authentication MKA Master Key in Authentication NEAU-S NEAU using Symmetric Cryptography PSAK Pre-Shared Authentication Key TLV Type-length-value UID Unique Identifier IS

    30、O/IEC 14443-3 ZSEED The Seed of Z 7 General This Standard specifies the NFC Entity Authentication using Symmetric cryptography (NEAU-S), using the key agreement and confirmation protocol in ISO/IEC 13157-1 (ECMA-385). To enable a key agreement and confirmation mechanism providing mutual authenticati

    31、on between NFC entities before they start the Shared Secret Service (SSE) and the Secure Channel Service (SCH), the Pre-Shared Authentication Key (PSAK), as a credential, between these entities is used in the entity authentication. After successful NEAU-S completion, a shared secret Z that is used t

    32、o establish the SSE and the SCH will be generated. Three-pass authentication per ISO/IEC 9798-2, mechanism 4, and key establishment per ISO/IEC 11770-2, mechanism 6, are used in NEAU-S. The relationship between NEAU-S and ISO/IEC 13157-1 (ECMA-385) is shown in Figure 1. Ecma International 2015 3Key

    33、ConfirmationISO/IEC 13157-1 (ECMA-385) Clause 9.2ServiceTerminationISO/IEC 13157-1 (ECMA-385) Clause 9.4SCHSSEKey AgreementISO/IEC 13157-1 (ECMA-385) Clause 9.1NEAU-SPDU securityISO/IEC 13157-1 (ECMA-385) Clause 9.3and Clause 12 of ISO/IEC 13157-3(ECMA-409)Figure 1 The use of the NFC-SEC protocol by

    34、 NEAU-S 8 Fields and PDUs for NEAU-S 8.1 Protocol Identifier (PID) This Standard shall use the one octet protocol identifier PID with value 4. 8.2 NFC-SEC-PDUs The peer NFC-SEC entities shall establish a shared secret Z using ACT_REQ, ACT_RES, VFY_REQ and VFY_RES according to the NEAU-S mechanism. 8

    35、.3 Entity identifiers The n-entity-title of the Senders and Recipients n-entity shall be used as IDSand IDR, respectively. Figure 2 specifies the encoding of IDSand IDR in the TLV format. 4 Ecma International 2015Figure 2 ID format 1. The Type subfield specifies the type of the ID and shall be 1 oct

    36、et in length. The values are: a) 1: Value subfield contains Sender (A) identification number, IDS; b) 2: Value subfield contains Recipient (B) identification number, IDR; c) All other values are RFU. 2. The 2-octet Length subfield contains the length in number of octets of the Value subfield, in the

    37、 range of 1 to 65535. 9 Primitives 9.1 General requirements Clause 9 specifies cryptographic primitives of NEAU-S. Clause 10 specifies the actual use of these primitives. Table 1 specifies the size and description of parameters. Table 1 NEAU-S parameters Parameter Field Size Description PSAK Variabl

    38、e Pre-Shared authentication key available to the Sender (A) and the Recipient (B). MKA 128 bits Master key used in the entity authentication and derived from the PSAK. KEIA 128 bits Encryption and integrity key used in the entity authentication and derived from the MKA. MAC 96 bits Message authentic

    39、ation code. IDSVariable The Sender (A) identification number. IDRVariable The Recipient (B) identification number. NA 128 bits See Clause 6 of ISO/IEC 13157-2 (ECMA-386). NB 128 bits See Clause 6 of ISO/IEC 13157-2 (ECMA-386). Z 256 bits See Clause 6 of ISO/IEC 13157-2 (ECMA-386). ZSEEDS256 bits The

    40、 Senders seed for the derivation of the shared secret Z. ZSEEDR256 bits The Recipients seed for the derivation of the shared secret Z. MK 128 bits See Clause 6 of ISO/IEC 13157-2 (ECMA-386). K 128 bits See Clause 6 of ISO/IEC 13157-2 (ECMA-386). IV 96 bits Initial value of counter. Ecma Internationa

    41、l 2015 5ISO/IEC 18031 shall be used to generate the random nonces and keys, with the exception of Dual_EC_DRBG. 9.2 Entity authentication 9.2.1 Mechanism Peer NFC-SEC entities achieve mutual authentication per ISO/IEC 9798-2, mechanism 4 by use of the PSAK which shall be known to them prior to the c

    42、ommencement of the NEAU-S mechanism. 9.2.2 AES AES per 5.1 of ISO/IEC 18033-3 shall be used for encryption, decryption and MACing during the entity authentication. 9.2.3 Modes of operation In the NEAU-S mechanism, the data authenticated encryption mode shall be GCM mode per 11 Authenticated encrypti

    43、on mechanism 6 (GCM) of ISO/IEC 19772. 9.2.4 Message Authentication Code (MAC) MACing shall be used for integrity protection of the payload of ACT_RES, VFY_REQ and VFY_RES. 9.3 Key agreement The shared secret Z shall be established using key establishment from ISO/IEC 11770-2, mechanism 6, which req

    44、uires both entities to contribute their seeds. 9.4 Key confirmation 9.4.1 Overview The MK shall be derived using the KDF per 9.2 of ISO/IEC 13157-3 (ECMA-409). This key confirmation mechanism is according to Clause 9 of ISO/IEC 11770-3. The MAC used for Key Confirmation (MacTag) shall be AES in CMAC

    45、-96 mode per ISO/IEC 13157-3 (ECMA-409). 9.4.2 Key confirmation tag generation The MacTagAin VFY_REQ shall be: MacTagA= AES-CMAC-96MK (MK, (02) | IDS | IDR | NA | NB), using AES-CMAC-96MKper ISO/IEC 13157-3 (ECMA-409), with key MK. The MacTagBin VFY_RES shall be: MacTagB= AES-CMAC-96MK (MK, (03) | I

    46、DR | IDS | NB | NA), using AES-CMAC-96MKper ISO/IEC 13157-3 (ECMA-409), with key MK. 9.4.3 Key confirmation tag verification The MacTagA shall be checked by evaluating the equation: MacTagA = AES-CMAC-96MK(MK, (02) | IDS | IDR | NA | NB) 6 Ecma International 2015The MacTagB shall be checked by evalu

    47、ating the equation: MacTagB = AES-CMAC-96MK(MK, (03) | IDR | IDS | NB | NA) 9.5 Key Derivation Function (KDF) 9.5.1 Overview Four KDFs are specified in NEAU-S for generating: MKA and KEIA; the shared secret Z; key of SSE and key of SCH. 9.5.2 KDF for MKA and KEIA The PRF shall be CMAC per 9.2 of ISO

    48、/IEC 13157-3 (ECMA-409), used with 128 bits output length. It will be denoted AES-CMAC-PRF-128. For the following sections PRF is: PRF (K, S) = AES-CMAC-PRF-128K(S) The KDF for the MKA and KEIA shall be: MKA, KEIA = KDF-MKA- KEIA (NA, NB, IDS, IDR, PSAK) Detail of the KDF-MKA- KEIA function: Seed =

    49、(NA 164 | NB 164) SKEYSEED = PRF(Seed, PSAK) MKA = PRF (SKEYSEED, Seed | IDS| IDR| (01) KEIA = PRF (SKEYSEED, MKA | Seed | IDS| IDR| (02) The keys MKA and KEIA shall be different for each NEAU-S invocation. 9.5.3 KDF for the shared secret Z The value of the shared secret Z shall be generated per a) of Annex C of ISO/IEC 11770-2: Z = ZSEEDS ZSEEDR9.5.4 KDF for the SSE and SCH 9.2.1 and 9.2.2 of ISO/IEC 13157-3 (ECMA-409) apply. Ecma International 2015 79.6 D


    注意事项

    本文(ECMA 411-2015 NFC-SEC-04 NFC-SEC Entity Authentication and Key Agreement using Symmetric Cryptography (2nd Edition).pdf)为本站会员(confusegate185)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开