ECMA 410-2015 NFC-SEC-03 NFC-SEC Entity Authentication and Key Agreement using Asymmetric Cryptography (2nd Edition).pdf
《ECMA 410-2015 NFC-SEC-03 NFC-SEC Entity Authentication and Key Agreement using Asymmetric Cryptography (2nd Edition).pdf》由会员分享,可在线阅读,更多相关《ECMA 410-2015 NFC-SEC-03 NFC-SEC Entity Authentication and Key Agreement using Asymmetric Cryptography (2nd Edition).pdf(32页珍藏版)》请在麦多课文档分享上搜索。
1、 Reference numberECMA-123:2009Ecma International 2009ECMA-410 2ndEdition / June 2015 NFC-SEC-03: NFC-SEC Entity Authentication and Key Agreement using Asymmetric Cryptography COPYRIGHT PROTECTED DOCUMENT Ecma International 2015 Ecma International 2015 iContents Page 1 Scope 1 2 Conformance . 1 3 Nor
2、mative references 1 4 Terms and definitions . 2 5 Conventions and notations 3 6 Acronyms . 3 7 General . 4 8 Fields and PDUs for NEAU-A . 5 8.1 Protocol Identifier (PID) 5 8.2 NFC-SEC-PDUs 5 8.3 TTP involving . 6 8.3.1 TTP policy and field . 6 8.3.2 TTP policy negotiation 6 8.4 Entity identifiers 7
3、8.5 Cert field . 7 8.6 Res field 7 9 Primitives . 8 9.1 General requirements . 8 9.2 Entity authentication . 9 9.2.1 Mechanisms . 9 9.2.2 EC curve . 10 9.2.3 ECDSA 10 9.2.4 Certificate validation . 12 9.3 Key agreement . 12 9.4 Key confirmation . 13 9.5 Key Derivation Function (KDF) 13 10 NEAU-A mec
4、hanism 13 10.1 Entity authentication involving a TTP . 13 10.1.1 Protocol overview 13 10.1.2 Preparation . 13 10.1.3 Sender (A) transformation 14 10.1.4 Recipient (B) transformation 15 10.1.5 TTP transformation . 16 10.2 Entity authentication without involving a TTP . 16 10.2.1 Protocol overview 16
5、10.2.2 Preparation . 17 10.2.3 Sender (A) transformation 17 10.2.4 Recipient (B) transformation 18 10.3 Key derivation 19 10.3.1 Sender (A) 19 10.3.2 Recipient (B) 19 11 Data Authenticated Encryption in SCH . 20 Annex A (normative) UDP Port 5111 and TAEP . 21 A.1 UDP and port 5111 . 21 A.1.1 UDP . 2
6、1 A.1.2 Port 5111 21 A.2 TAEP . 22 ii Ecma International 2015A.2.1 TAEP packet format .22 A.2.2 TAEP_REQ and TAEP_RES format 22 Annex B (informative) ECDSA test vectors 23 Bibliography 24 Ecma International 2015 iiiIntroduction The NFC Security series of standards comprise a common services and prot
7、ocol Standard and NFC-SEC cryptography standards. This NFC-SEC cryptography Standard specifies an NFC Entity Authentication (NEAU) mechanism that uses the asymmetric cryptography algorithm (NEAU-A) for mutual authentication of two NFC entities. This Standard addresses entity authentication of two NF
8、C entities possessing certificates and private keys during key agreement and key confirmation for the Shared Secret Service (SSE) and Secure Channel Service (SCH). This Standard adds entity authentication to the services provided by ISO/IEC 13157-3 (ECMA-409) NFC-SEC-02. This 2ndedition refers to th
9、e latest standards. This Ecma Standard has been adopted by the General Assembly of June 2015. iv Ecma International 2015“COPYRIGHT NOTICE 2015 Ecma International This document may be copied, published and distributed to others, and certain derivative works of it may be prepared, copied, published, a
10、nd distributed, in whole or in part, provided that the above copyright notice and this Copyright License and Disclaimer are included on all such copies and derivative works. The only derivative works that are permissible under this Copyright License and Disclaimer are: (i) works which incorporate al
11、l or portion of this document for the purpose of providing commentary or explanation (such as an annotated version of the document), (ii) works which incorporate all or portion of this document for the purpose of incorporating features that provide accessibility, (iii) translations of this document
12、into languages other than English and into different formats and (iv) works by making use of this specification in standard conformant products by implementing (e.g. by copy and paste wholly or partly) the functionality therein. However, the content of this document itself may not be modified in any
13、 way, including by removing the copyright notice or references to Ecma International, except as required to translate it into languages other than English or into a different format. The official version of an Ecma International document is the English language version on the Ecma International webs
14、ite. In the event of discrepancies between a translated version and the official version, the official version shall govern. The limited permissions granted above are perpetual and will not be revoked by Ecma International or its successors or assigns. This document and the information contained her
15、ein is provided on an “AS IS“ basis and ECMA INTERNATIONAL DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY OWNERSHIP RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PU
16、RPOSE.“ NFC-SEC-03: NFC-SEC Entity Authentication and Key Agreement using Asymmetric Cryptography 1 Scope This Standard specifies the message contents and the cryptographic mechanisms for PID 03. This Standard specifies key agreement and confirmation mechanisms providing mutual authentication, using
17、 asymmetric cryptography, and the transport protocol requirements for the exchange between Sender and TTP. NOTE This Standard adds entity authentication to the services provided by ISO/IEC 13157-3 (ECMA-409) NFC-SEC-02. 2 Conformance Conformant NFC-SEC entities employ the security mechanisms and the
18、 transport protocol requirements specified in this NFC-SEC cryptography Standard (identified by PID 03) and conform to ISO/IEC 13157-1 (ECMA-385). Conformant TTP implementations employ the security mechanisms and the transport protocol requirements specified in this NFC-SEC cryptography Standard (id
19、entified by PID 03). The NFC-SEC security services shall be established through the protocol specified in ISO/IEC 13157-1 (ECMA-385) and the mechanisms specified in this Standard. 3 Normative references The following referenced documents are indispensable for the application of this document. For da
20、ted references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. ISO/IEC 7498-1:1994, Information technology - Open Systems Interconnection - Basic Reference Model: The Basic Model ISO/IEC 9798-1:2010, Informati
21、on technology - Security techniques - Entity authentication - Part 1: General ISO/IEC 9798-3:1998, Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques ISO/IEC 9798-3:1998/Amd.1:2010, Information technology - Security techniques
22、 - Entity authentication - Part 3: Mechanisms using digital signature techniques - AMENDMENT 1 ISO/IEC 10118-3:2004, Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions ISO/IEC 11770-3, Information technology - Security techniques - Key management - Part
23、3: Mechanisms using asymmetric techniques ISO/IEC 13157-1, Information technology - Telecommunications and information exchange between systems - NFC Security - Part 1: NFC-SEC NFCIP-1 security services and protocol (ECMA-385) ISO/IEC 13157-2, Information technology - Telecommunications and informat
24、ion exchange between systems - NFC Security - Part 2: NFC-SEC cryptography standard using ECDH and AES (ECMA-386) Ecma International 2015 1ISO/IEC 13157-3, Information technology - Telecommunications and information exchange between systems - NFC Security - Part 3: NFC-SEC Cryptography Standard usin
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ECMA4102015NFCSEC03NFCSECENTITYAUTHENTICATIONANDKEYAGREEMENTUSINGASYMMETRICCRYPTOGRAPHY2NDEDITIONPDF

链接地址:http://www.mydoc123.com/p-704843.html