ECMA 409-2015 NFC-SEC-02 NFC-SEC Cryptography Standard using ECDH-256 and AES-GCM (2nd Edition).pdf
《ECMA 409-2015 NFC-SEC-02 NFC-SEC Cryptography Standard using ECDH-256 and AES-GCM (2nd Edition).pdf》由会员分享,可在线阅读,更多相关《ECMA 409-2015 NFC-SEC-02 NFC-SEC Cryptography Standard using ECDH-256 and AES-GCM (2nd Edition).pdf(16页珍藏版)》请在麦多课文档分享上搜索。
1、 Reference numberECMA-123:2009Ecma International 2009ECMA-409 2ndEdition / June 2015 NFC-SEC-02: NFC-SEC Cryptography Standard using ECDH-256 and AES-GCM COPYRIGHT PROTECTED DOCUMENT Ecma International 2015 Ecma International 2015 iContents Page 1 Scope 1 2 Conformance . 1 3 Normative references 1 4
2、 Terms and definitions . 2 5 Conventions and notations 2 6 Acronyms . 2 7 General . 2 8 Protocol Identifier (PID) 2 9 Primitives . 2 9.1 Key agreement . 3 9.1.1 Curve P- 256 . 3 9.1.2 EC Key Pair Generation Primitive 3 9.1.3 EC Public key validation . 3 9.1.4 ECDH secret value derivation Primitive 3
3、 9.1.5 Random nonces . 3 9.2 Key Derivation Functions . 3 9.2.1 KDF for the SSE . 4 9.2.2 KDF for the SCH 4 9.3 Key Usage 4 9.4 Key Confirmation . 4 9.4.1 Key confirmation tag generation . 5 9.4.2 Key confirmation tag verification 5 9.5 Data Authenticated Encryption 5 9.5.1 Starting Variable (StartV
4、ar) 5 9.5.2 Additional Authenticated Data (AAD) 5 9.5.3 Generation-Encryption 5 9.5.4 Decryption-Verification . 5 9.6 Data Integrity 6 9.7 Message Sequence Integrity 6 10 Data Conversions 6 11 SSE and SCH service invocation . 6 12 SCH data exchange . 6 12.1 Preparation . 6 12.2 Data Exchange . 7 12.
5、2.1 Send 7 12.2.2 Receive . 7 Annex A (normative) Fields sizes . 9 ii Ecma International 2015Introduction The NFC Security series of standards comprise a common services and protocol Standard and NFC-SEC cryptography standards. This NFC-SEC cryptography Standard specifies cryptographic mechanisms th
6、at use the Elliptic Curves Diffie-Hellman (ECDH-256) protocol for key agreement and the AES algorithm in GCM mode to provide data authenticated encryption. This Standard addresses secure communication of two NFC devices that do not share any common secret data (“keys“) before they start communicatin
7、g which each other. It is based on ISO/IEC 13157-2 (ECMA-386) with some adaptations to address actual cryptography standards. This 2ndedition refers to the latest standards and updates the generation method for StartVar in compliance with ISO/IEC 19772:2009/Cor.1:2014 which also complies with NIST S
8、P 800-38B. This Ecma Standard has been adopted by the General Assembly of June 2015. Ecma International 2015 iii“COPYRIGHT NOTICE 2015 Ecma International This document may be copied, published and distributed to others, and certain derivative works of it may be prepared, copied, published, and distr
9、ibuted, in whole or in part, provided that the above copyright notice and this Copyright License and Disclaimer are included on all such copies and derivative works. The only derivative works that are permissible under this Copyright License and Disclaimer are: (i) works which incorporate all or por
10、tion of this document for the purpose of providing commentary or explanation (such as an annotated version of the document), (ii) works which incorporate all or portion of this document for the purpose of incorporating features that provide accessibility, (iii) translations of this document into lan
11、guages other than English and into different formats and (iv) works by making use of this specification in standard conformant products by implementing (e.g. by copy and paste wholly or partly) the functionality therein. However, the content of this document itself may not be modified in any way, in
12、cluding by removing the copyright notice or references to Ecma International, except as required to translate it into languages other than English or into a different format. The official version of an Ecma International document is the English language version on the Ecma International website. In
13、the event of discrepancies between a translated version and the official version, the official version shall govern. The limited permissions granted above are perpetual and will not be revoked by Ecma International or its successors or assigns. This document and the information contained herein is p
14、rovided on an “AS IS“ basis and ECMA INTERNATIONAL DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY OWNERSHIP RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.“
15、iv Ecma International 2015NFC-SEC-02: NFC-SEC Cryptography Standard using ECDH-256 and AES-GCM 1 Scope This Standard specifies the message contents and the cryptographic methods for PID 02. This Standard specifies cryptographic mechanisms that use the Elliptic Curves Diffie-Hellman (ECDH) protocol w
16、ith a key length of 256 bits for key agreement and the AES algorithm in GCM mode to provide data authenticated encryption. 2 Conformance Conformant implementations employ the security mechanisms specified in this NFC-SEC cryptography Standard (identified by PID 02) and conform to ISO/IEC 13157-1 (EC
17、MA-385). The NFC-SEC security services shall be established through the protocol specified in ISO/IEC 13157-1 (ECMA-385) and the mechanisms specified in this Standard. 3 Normative references The following referenced documents are indispensable for the application of this document. For dated referenc
18、es, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. ISO/IEC 9797-1:2011, Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher ISO/IEC 1177
19、0-3, Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques ISO/IEC 13157-1, Information technology - Telecommunications and information exchange between systems - NFC Security - Part 1: NFC-SEC NFCIP-1 security services and protocol (ECMA-385)
20、 ISO/IEC 13157-2, Information technology - Telecommunications and information exchange between systems - NFC Security - Part 2: NFC-SEC cryptography standard using ECDH and AES (ECMA-386) ISO/IEC 18031:2011, Information technology - Security techniques - Random bit generation ISO/IEC 18031:2011/Cor.
21、1:2014, Information technology - Security techniques - Random bit generation - Technical Corrigendum 1 ISO/IEC 18033-3:2010, Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers ISO/IEC 19772:2009, Information technology - Security techniques - Authenticated e
22、ncryption ISO/IEC 19772:2009/Cor.1:2014, Information technology - Security techniques - Authenticated encryption - Technical Corrigendum 1 Ecma International 2015 1FIPS 186-4, Digital Signature Standard (DSS) 4 Terms and definitions Clause 4 of ISO/IEC 13157-2 (ECMA-386) applies. 5 Conventions and n
23、otations Clause 5 of ISO/IEC 13157-2 (ECMA-386) applies. 6 Acronyms Clause 6 of ISO/IEC 13157-2 (ECMA-386) applies. Additionally, the following acronyms apply. AAD Additional Authenticated Data GCM CMAC Galois Counter Mode Cipher-based MAC 7 General Clause 7 of ISO/IEC 13157-2 (ECMA-386) applies. 8
24、Protocol Identifier (PID) This Standard shall use the one octet protocol identifier PID with value 2. 9 Primitives This Clause specifies cryptographic primitives. Clauses 11 and 12 specify the actual use of these primitives. Table 1 summarizes the features. 2 Ecma International 2015Table 1 Summary o
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ECMA4092015NFCSEC02NFCSECCRYPTOGRAPHYSTANDARDUSINGECDH256ANDAESGCM2NDEDITIONPDF

链接地址:http://www.mydoc123.com/p-704842.html