ECMA 386-2015 NFC-SEC-01 NFC-SEC Cryptography Standard using ECDH and AES (3rd Edition).pdf
《ECMA 386-2015 NFC-SEC-01 NFC-SEC Cryptography Standard using ECDH and AES (3rd Edition).pdf》由会员分享,可在线阅读,更多相关《ECMA 386-2015 NFC-SEC-01 NFC-SEC Cryptography Standard using ECDH and AES (3rd Edition).pdf(26页珍藏版)》请在麦多课文档分享上搜索。
1、 Reference numberECMA-123:2009Ecma International 2009ECMA-386 3rdEdition / June 2015 NFC-SEC-01: NFC-SEC Cryptography Standard using ECDH and AES COPYRIGHT PROTECTED DOCUMENT Ecma International 2015 Ecma International 2015 iContents Page 1 Scope 1 2 Conformance . 1 3 Normative references 1 4 Terms a
2、nd definitions . 1 5 Conventions and notations 2 5.1 Concatenation 2 5.2 Hexadecimal numbers 2 6 Acronyms . 2 7 General . 3 8 Protocol Identifier (PID) 3 9 Primitives . 3 9.1 Key agreement . 4 9.1.1 Curve P-192 4 9.1.2 EC Key Pair Generation Primitive 4 9.1.3 EC Public key validation . 4 9.1.4 ECDH
3、secret value derivation Primitive 4 9.1.5 Random nonces . 4 9.2 Key Derivation Functions . 5 9.2.1 KDF for the SSE . 5 9.2.2 KDF for the SCH 5 9.3 Key Usage 5 9.4 Key Confirmation . 6 9.4.1 Key confirmation tag generation . 6 9.4.2 Key confirmation tag verification 6 9.5 Data Encryption . 6 9.5.1 In
4、itial value of counter (IV) . 6 9.5.2 Encryption 6 9.5.3 Decryption 7 9.6 Data Integrity 7 9.6.1 Protect data integrity . 7 9.6.2 Check data integrity 7 9.7 Message Sequence Integrity 7 10 Data Conversions 7 10.1 Integer-to-Octet-String Conversion . 7 10.2 Octet-String-to-Integer Conversion . 7 10.3
5、 Point-to-Octet-String Conversion 8 10.4 Octet-String-to-Point Conversion 8 11 SSE and SCH service invocation . 8 11.1 Pre-requisites . 9 11.2 Key Agreement 10 11.2.1 Sender (A) Transformation . 10 11.2.2 Recipient (B) Transformation . 10 11.3 Key Derivation . 11 11.3.1 Sender (A) Transformation . 1
6、1 11.3.2 Recipient (B) Transformation . 11 11.4 Key Confirmation . 11 11.4.1 Sender (A) Transformation . 11 ii Ecma International 201511.4.2 Recipient (B) Transformation .12 12 SCH data exchange .12 12.1 Preparation .13 12.2 Data Exchange .13 12.2.1 Send 13 12.2.2 Receive .13 Annex A (normative) AES
7、-XCBC-PRF-128 and AES-XCBC-MAC-96 algorithms 15 A.1 AES-XCBC-PRF-128 15 A.2 AES-XCBC-MAC-9615 Annex B (normative) Fields sizes 17 Annex C (informative) Informative references .19 Ecma International 2015 iiiIntroduction The NFC Security series of standards comprise a common services and protocol Stan
8、dard and NFC-SEC cryptography standards. This NFC-SEC cryptography Standard specifies cryptographic mechanisms that use the Elliptic Curves Diffie-Hellman (ECDH) protocol for key agreement and the AES algorithm for data encryption and integrity. This Standard addresses secure communication of two NF
9、C devices that do not share any common secret data (“keys“) before they start communicating which each other. The 3rdedition ensures to use the latest references to cryptographic standards. This Ecma Standard has been adopted by the General Assembly of June 2015. iv Ecma International 2015“COPYRIGHT
10、 NOTICE 2015 Ecma International This document may be copied, published and distributed to others, and certain derivative works of it may be prepared, copied, published, and distributed, in whole or in part, provided that the above copyright notice and this Copyright License and Disclaimer are includ
11、ed on all such copies and derivative works. The only derivative works that are permissible under this Copyright License and Disclaimer are: (i) works which incorporate all or portion of this document for the purpose of providing commentary or explanation (such as an annotated version of the document
12、), (ii) works which incorporate all or portion of this document for the purpose of incorporating features that provide accessibility, (iii) translations of this document into languages other than English and into different formats and (iv) works by making use of this specification in standard confor
13、mant products by implementing (e.g. by copy and paste wholly or partly) the functionality therein. However, the content of this document itself may not be modified in any way, including by removing the copyright notice or references to Ecma International, except as required to translate it into lang
14、uages other than English or into a different format. The official version of an Ecma International document is the English language version on the Ecma International website. In the event of discrepancies between a translated version and the official version, the official version shall govern. The l
15、imited permissions granted above are perpetual and will not be revoked by Ecma International or its successors or assigns. This document and the information contained herein is provided on an “AS IS“ basis and ECMA INTERNATIONAL DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
16、 TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY OWNERSHIP RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.“ NFC-SEC-01: NFC-SEC Cryptography Standard using ECDH and AES 1 Scope This Standard specifies the message contents and the
17、cryptographic methods for PID 01. This Standard specifies cryptographic mechanisms that use the Elliptic Curves Diffie-Hellman (ECDH) protocol for key agreement and the AES algorithm for data encryption and integrity. 2 Conformance Conformant implementations employ the security mechanisms specified
18、in this NFC-SEC cryptography Standard (identified by PID 01) and conform to ECMA-385. The NFC-SEC security services shall be established through the protocol specified in ECMA-385 and the mechanisms specified in this Standard. 3 Normative references The following referenced documents are indispensab
19、le for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. ECMA-340, Near Field Communication Interface and Protocol (NFCIP-1) ECMA-385, NFC-SEC: NFCIP-1 Secu
20、rity Services and Protocol ISO/IEC 10116, Information technology - Security techniques - Modes of operation for an n-bit block cipher ISO/IEC 11770-3, Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques ISO/IEC 15946-1, Information technolog
21、y - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General ISO/IEC 18031, Information technology - Security techniques - Random bit generation ISO/IEC 18033-3, Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers IEEE 1363, I
22、EEE Standard Specifications for Public-Key Cryptography FIPS 186-4, Digital Signature Standard (DSS) 4 Terms and definitions For the purposes of this Standard, all terms and definitions from ECMA-385 apply. Ecma International 2015 15 Conventions and notations The conventions and notations of ECMA-38
23、5 as well as the following apply in this document unless otherwise stated. 5.1 Concatenation A | B represents the concatenation of the fields A and B: content of A followed by content of B. 5.2 Hexadecimal numbers (XY) denotes a hexadecimal number XY (i.e. with the Radix of 16) and each pair of char
24、acters is encoded in one octet. 6 Acronyms For the purposes of this Standard, all acronyms from ECMA-385 apply. Additionally, the following acronyms apply. A Sender, as specified in ECMA-385 AES Advanced Encryption Standard B Receiver, as specified in ECMA-385 dASenders private EC key dBRecipients p
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ECMA3862015NFCSEC01NFCSECCRYPTOGRAPHYSTANDARDUSINGECDHANDAES3RDEDITIONPDF

链接地址:http://www.mydoc123.com/p-704819.html