ECMA 411-2015 NFC-SEC-04 NFC-SEC Entity Authentication and Key Agreement using Symmetric Cryptography (2nd Edition).pdf
《ECMA 411-2015 NFC-SEC-04 NFC-SEC Entity Authentication and Key Agreement using Symmetric Cryptography (2nd Edition).pdf》由会员分享,可在线阅读,更多相关《ECMA 411-2015 NFC-SEC-04 NFC-SEC Entity Authentication and Key Agreement using Symmetric Cryptography (2nd Edition).pdf(18页珍藏版)》请在麦多课文档分享上搜索。
1、 Reference numberECMA-123:2009Ecma International 2009ECMA-411 2ndEdition / June 2015 NFC-SEC-04: NFC-SEC Entity Authentication and Key Agreement using Symmetric Cryptography COPYRIGHT PROTECTED DOCUMENT Ecma International 2015 Ecma International 2015 iContents Page 1 Scope 1 2 Conformance . 1 3 Norm
2、ative references 1 4 Terms and definitions . 2 5 Conventions and notations 2 6 Acronyms . 3 7 General . 3 8 Fields and PDUs for NEAU-S . 4 8.1 Protocol Identifier (PID) 4 8.2 NFC-SEC-PDUs 4 8.3 Entity identifiers 4 9 Primitives . 5 9.1 General requirements . 5 9.2 Entity authentication . 6 9.2.1 Mec
3、hanism . 6 9.2.2 AES . 6 9.2.3 Modes of operation . 6 9.2.4 Message Authentication Code (MAC) . 6 9.3 Key agreement . 6 9.4 Key confirmation . 6 9.4.1 Overview . 6 9.4.2 Key confirmation tag generation . 6 9.4.3 Key confirmation tag verification 6 9.5 Key Derivation Function (KDF) 7 9.5.1 Overview .
4、 7 9.5.2 KDF for MKA and KEIA . 7 9.5.3 KDF for the shared secret Z . 7 9.5.4 KDF for the SSE and SCH . 7 9.6 Data authenticated encryption during authentication . 8 9.6.1 Initial value (IV) 8 9.6.2 Additional Authenticated Data (AAD) 8 9.6.3 NEAU-S payload encryption and MAC generation 8 9.6.4 NEAU
5、-S payload decryption and MAC verification 8 10 NEAU-S mechanism 9 10.1 Protocol overview 9 10.2 Preparation . 9 10.3 Sender (A) transformation 9 10.4 Recipient (B) transformation 10 11 Data Authenticated Encryption in SCH . 11 ii Ecma International 2015Introduction The NFC Security series of standa
6、rds comprise a common services and protocol Standard and NFC-SEC cryptography standards. This NFC-SEC cryptography Standard specifies an NFC Entity Authentication (NEAU) mechanism that uses the symmetric cryptographic algorithm (NEAU-S) for mutual authentication of two NFC entities. This Standard ad
7、dresses entity authentication of two NFC entities possessing a Pre-Shared Authentication Key (PSAK) during the key agreement and confirmation for the Shared Secret Service (SSE) and Secure Channel Service (SCH). This Standard adds entity authentication to the services provided by ISO/IEC 13157-3 (EC
8、MA-409) NFC-SEC-02. This 2ndedition refers to the latest standards and the StarVar generation method for IV in NFC-SEC-02. This Ecma Standard has been adopted by the General Assembly of June 2015. Ecma International 2015 iii“COPYRIGHT NOTICE 2015 Ecma International This document may be copied, publi
9、shed and distributed to others, and certain derivative works of it may be prepared, copied, published, and distributed, in whole or in part, provided that the above copyright notice and this Copyright License and Disclaimer are included on all such copies and derivative works. The only derivative wo
10、rks that are permissible under this Copyright License and Disclaimer are: (i) works which incorporate all or portion of this document for the purpose of providing commentary or explanation (such as an annotated version of the document), (ii) works which incorporate all or portion of this document fo
11、r the purpose of incorporating features that provide accessibility, (iii) translations of this document into languages other than English and into different formats and (iv) works by making use of this specification in standard conformant products by implementing (e.g. by copy and paste wholly or pa
12、rtly) the functionality therein. However, the content of this document itself may not be modified in any way, including by removing the copyright notice or references to Ecma International, except as required to translate it into languages other than English or into a different format. The official
13、version of an Ecma International document is the English language version on the Ecma International website. In the event of discrepancies between a translated version and the official version, the official version shall govern. The limited permissions granted above are perpetual and will not be rev
14、oked by Ecma International or its successors or assigns. This document and the information contained herein is provided on an “AS IS“ basis and ECMA INTERNATIONAL DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT I
15、NFRINGE ANY OWNERSHIP RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.“ iv Ecma International 2015NFC-SEC-04: NFC-SEC Entity Authentication and Key Agreement using Symmetric Cryptography 1 Scope This Standard specifies the message contents and the cryptographi
16、c mechanisms for PID 04. This Standard specifies key agreement and confirmation mechanisms providing mutual authentication, using symmetric cryptography. NOTE This Standard adds entity authentication to the services provided by ISO/IEC 13157-3 (ECMA-409) NFC-SEC-02. 2 Conformance Conformant implemen
17、tations employ the security mechanisms specified in this NFC-SEC cryptography Standard (identified by PID 04) and conform to ISO/IEC 13157-1 (ECMA-385). The NFC-SEC security services shall be established through the protocol specified in ISO/IEC 13157-1 (ECMA-385) and the mechanisms specified in thi
18、s Standard. 3 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. ISO/IEC 7498-1
19、:1994, Information technology - Open Systems Interconnection - Basic Reference Model: The Basic Model ISO/IEC 9798-1:2010, Information technology - Security techniques - Entity authentication - Part 1: General ISO/IEC 9798-2:2008, Information technology - Security techniques - Entity authentication
20、- Part 2: Mechanisms using symmetric encipherment algorithms ISO/IEC 11770-1:2010, Information technology - Security techniques - Key management - Part 1: Framework ISO/IEC 11770-2:2008, Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques ISO
21、/IEC 11770-3, Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques ISO/IEC 13157-1, Information technology - Telecommunications and information exchange between systems - NFC Security - Part 1: NFC-SEC NFCIP-1 security services and protocol (
22、ECMA-385) ISO/IEC 13157-2, Information technology - Telecommunications and information exchange between systems - NFC Security - Part 2: NFC-SEC cryptography standard using ECDH and AES (ECMA-386) Ecma International 2015 1ISO/IEC 13157-3, Information technology - Telecommunications and information e
23、xchange between systems - NFC Security - Part 3: NFC-SEC Cryptography Standard using ECDH-256 and AES-GCM (ECMA-409) ISO/IEC 14443-3, Identification cards - Contactless integrated circuit cards - Proximity cards - Part 3: Initialization and anticollision ISO/IEC 18031:2011, Information technology -
24、Security techniques - Random bit generation ISO/IEC 18031:2011/Cor.1:2014, Information technology - Security techniques - Random bit generation - Technical Corrigendum 1 ISO/IEC 18033-3:2010, Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers ISO/IEC 18092,
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ECMA4112015NFCSEC04NFCSECENTITYAUTHENTICATIONANDKEYAGREEMENTUSINGSYMMETRICCRYPTOGRAPHY2NDEDITIONPDF

链接地址:http://www.mydoc123.com/p-704844.html