BS ISO IEC 7816-15-2016 Identification cards Integrated circuit cards Cryptographic information application《识别卡 集成电路卡 加密信息应用》.pdf
《BS ISO IEC 7816-15-2016 Identification cards Integrated circuit cards Cryptographic information application《识别卡 集成电路卡 加密信息应用》.pdf》由会员分享,可在线阅读,更多相关《BS ISO IEC 7816-15-2016 Identification cards Integrated circuit cards Cryptographic information application《识别卡 集成电路卡 加密信息应用》.pdf(128页珍藏版)》请在麦多课文档分享上搜索。
1、BS ISO/IEC 7816-15:2016 Identification cards Integrated circuit cards Part 15: Cryptographic information applicationBS ISO/IEC 7816-15:2016 BRITISH STANDARD National foreword This British Standard is the UK implementation of ISO/IEC 7816-15:2016. It supersedes BS ISO/IEC 7816-15:2004+A2:2008 which i
2、s withdrawn. The UK participation in its preparation was entrusted to Technical Committee IST/17, Cards and personal identification. A list of organizations represented on this committee can be obtained on request to its secretary. This publication does not purport to include all the necessary provi
3、sions of a contract. Users are responsible for its correct application. The British Standards Institution 2016. Published by BSI Standards Limited 2016 ISBN 978 0 580 84929 9 ICS 35.240.15 Compliance with a British Standard cannot confer immunity from legal obligations. This British Standard was pub
4、lished under the authority of the Standards Policy and Strategy Committee on 31 May 2016. Amendments/corrigenda issued since publication Date T e x t a f f e c t e dBS ISO/IEC 7816-15:2016 Identification cards Integrated circuit cards Part 15: Cryptographic information application Cartes didentifica
5、tion Cartes circuit intgr contacts Partie 15: Application des informations cryptographiques INTERNATIONAL STANDARD ISO/IEC 7816-15 Reference number ISO/IEC 7816-15:2016(E) Second edition 2016-05-15 ISO/IEC 2016 BS ISO/IEC 7816-15:2016ii ISO/IEC 2016 All rights reserved COPYRIGHT PROTECTED DOCUMENT I
6、SO/IEC 2016, Published in Switzerland All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written p
7、ermission. Permission can be requested from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Ch. de Blandonnet 8 CP 401 CH-1214 Vernier, Geneva, Switzerland Tel. +41 22 749 01 11 Fax +41 22 749 09 47 copyrightiso.org www.iso.org ISO/IEC 7816-1
8、5:2016(E)BS ISO/IEC 7816-15:2016 ISO/IEC 7816-15:2016(E) ISO/IEC 2016 All rights reserved i Contents Page Foreword iv Introduction vi 1 Scope 1 2 Normative references 2 3 Terms and definitions . 2 4 Symbols and abbreviated terms 5 4.1 Symbols 5 4.2 Abbreviated terms . 5 5 Conventions . 7 6 Cryptogra
9、phic information objects . 7 6.1 General . 7 6.2 CIO classes 7 6.3 Attributes 8 6.4 Access restrictions . 8 7 CIO files 8 7.1 Overview . 8 7.2 IC card requirements . 8 7.3 Card file structure 9 7.4 EF.DIR . 9 7.5 Contents of DF.CIA 11 7.5.1 Overview . 11 7.5.2 CIAInfo EF 11 7.5.3 EF.OD 12 7.5.4 CIO
10、directory files 12 7.5.5 DF.CIA selection 13 8 Information syntax in ASN.1 14 8.1 Guidelines and encoding conventions . 14 8.2 Basic ASN.1 defined types . 14 8.2.1 Identifier 14 8.2.2 Reference . 14 8.2.3 Label . 14 8.2.4 CredentialIdentifier 14 8.2.5 ReferencedValue and Path . 15 8.2.6 ObjectValue
11、16 8.2.7 PathOrObjects . 17 8.2.8 CommonObjectAttributes . 17 8.2.9 CommonKeyAttributes . 21 8.2.10 CommonPrivateKeyAttributes . 22 8.2.11 CommonPublicKeyAttributes. 23 8.2.12 CommonSecretKeyAttributes 23 8.2.13 GenericKeyAttributes 24 8.2.14 KeyInfo 24 8.2.15 CommonCertificateAttributes 24 8.2.16 G
12、enericCertificateAttributes 25 8.2.17 CommonDataContainerObjectAttributes 25 8.2.18 CommonAuthenticationObjectAttributes . 25 8.2.19 CIO type 26 8.3 CIOChoice type 26 BS ISO/IEC 7816-15:2016 ISO/IEC 7816-15:2016(E) ii ISO/IEC 2016 All rights reserved 8.4 Private key information objects 27 8.4.1 Priv
13、ateKeyChoice . 27 8.4.2 Private RSA key attributes . 27 8.4.3 Private elliptic curve key attributes 27 8.4.4 Private Diffie-Hellman key attributes 28 8.4.5 Private DSA key attributes . 28 8.4.6 Private KEA key attributes . 28 8.4.7 Generic private key information objects 28 8.5 Public key informatio
14、n objects 29 8.5.1 PublicKeyChoice. 29 8.5.2 Public RSA key attributes 29 8.5.3 Public elliptic curve key attributes 29 8.5.4 Public Diffie-Hellman key attributes . 30 8.5.5 Public DSA key attributes 30 8.5.6 Public KEA key attributes 30 8.5.7 Generic public key information objects . 31 8.6 Secret k
15、ey information objects . 31 8.6.1 SecretKeyChoice 31 8.6.2 Algorithm independent key attributes 31 8.6.3 GenericSecretKey type 31 8.7 Certificate information objects 31 8.7.1 CertificateChoice 31 8.7.2 X.509 certificate attributes . 32 8.7.3 X.509 attribute certificate attributes 32 8.7.4 SPKI certi
16、ficate attributes 32 8.7.5 PGP (Pretty Good Privacy) certificate attributes . 33 8.7.6 WTLS certificate attributes 33 8.7.7 ANSI X9.68 domain certificate attributes . 33 8.7.8 Card verifiable certificate attributes . 33 8.7.9 Generic certificate attributes . 34 8.8 Data container information objects
17、 34 8.8.1 DataContainerObjectChoice 34 8.8.2 Opaque data container object attributes 34 8.8.3 ISO/IEC 7816 data object attributes 34 8.8.4 Data container information objects identified by OBJECT IDENTIFIERS . 34 8.9 Authentication information objects 35 8.9.1 AuthenticationObjectChoice . 35 8.9.2 Pa
18、ssword attributes . 35 8.9.3 Biometric reference data attributes 38 8.9.4 Authentication objects for external and internal authentication . 40 8.10 Cryptographic information file, EF.CIAInfo 40 Annex A (normative) ASN.1 module . 43 Annex B (informative) CIA example for cards with digital signature a
19、nd authentication functionality . 59 B.1 General . 59 B.2 CIOs 59 B.3 Access control 60 Annex C (informative) Example topologies 62 Annex D (informative) Examples of CIO values and their encodings . 67 D.1 General . 67 D.2 EF.OD . 67 D.2.1 ASN.1 value notation 67 D.2.2 ASN.1 description, tags, lengt
20、hs and values . 68 D.2.3 Hexadecimal DER-encoding 68 D.3 EF.CIAInfo 68 D.3.1 ASN.1 value notation 68 D.3.2 ASN.1 description, tags, lengths and values . 69 D.3.3 Hexadecimal DER-encoding 69 BS ISO/IEC 7816-15:2016 ISO/IEC 7816-15:2016(E) ISO/IEC 2016 All rights reserved iii D.4 EF.PrKD 69 D.4.1 ASN.
21、1 value notation . 69 D.4.2 ASN.1 description, tags, lengths and values 70 D.4.3 Hexadecimal DER-encoding . 71 D.5 EF. CD . 72 D.5.1 ASN.1 value notation . 72 D.5.2 ASN.1 description, tags, lengths and values 73 D.5.3 Hexadecimal DER-encoding . 73 D.6 EF.AOD . 74 D.6.1 ASN.1 value notation . 74 D.6.
22、2 ASN.1 description, tags, lengths and values 74 D.6.3 Hexadecimal DER-encoding . 76 D.7 EF.DCOD. 76 D.7.1 ASN.1 value notation . 76 D.7.2 ASN.1 description, tags, lengths and values 77 D.7.3 Hexadecimal DER-encoding of DCOD . 77 D.8 Application template (within the EF.DIR) 78 D.8.1 ASN.1 value nota
23、tion . 78 D.8.2 ASN.1 description, tags, lengths and values in ApplicationTemplate . 78 D.8.3 Hexadecimal DER-encoding of ApplicationTemplate 78 D.9 GeneralizedTime encoding guidelines 78 Annex E (informative) Examples of the use of the cryptographic information application 80 E.1 General . 80 E.2 E
24、ncoding of a private key . 80 E.2.1 Cryptographic information application example description . 80 E.2.2 ASN.1 encoding of an RSA private key . 80 E.2.3 Code encoding and decoding from the ASN.1 . 81 E.2.4 BER encoding 84 E.3 Encoding of a protected data container 86 E.3.1 Cryptographic information
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BSISOIEC7816152016IDENTIFICATIONCARDSINTEGRATEDCIRCUITCARDSCRYPTOGRAPHICINFORMATIONAPPLICATION 识别 集成

链接地址:http://www.mydoc123.com/p-396867.html