ETSI TS 102 176-2-2005 Electronic Signatures and Infrastructures (ESI) Algorithms and Parameters for Secure Electronic Signatures Part 2 Secure channel protocols and algorithms for_1.pdf
《ETSI TS 102 176-2-2005 Electronic Signatures and Infrastructures (ESI) Algorithms and Parameters for Secure Electronic Signatures Part 2 Secure channel protocols and algorithms for_1.pdf》由会员分享,可在线阅读,更多相关《ETSI TS 102 176-2-2005 Electronic Signatures and Infrastructures (ESI) Algorithms and Parameters for Secure Electronic Signatures Part 2 Secure channel protocols and algorithms for_1.pdf(18页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI TS 102 176-2 V1.2.1 (2005-07)Technical Specification Electronic Signatures and Infrastructures (ESI);Algorithms and Parameters for Secure Electronic Signatures;Part 2: Secure channel protocols andalgorithms for signature creation devicesETSI ETSI TS 102 176-2 V1.2.1 (2005-07) 2 Reference RTS/E
2、SI-000039-2 Keywords e-commerce, electronic signature, security ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88
3、Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version i
4、s the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status.
5、Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification
6、No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2005. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the
7、benefit of its Members. TIPHONTMand the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI TS 102 176-2 V1.2.1 (2005-07) 3 Contents
8、Intellectual Property Rights4 Foreword.4 Introduction 4 1 Scope 5 2 References 5 3 Definitions and abbreviations.6 3.1 Definitions6 3.2 Abbreviations .6 4 Maintenance activities6 5 Secure messaging for smart cards 6 5.1 General .6 5.2 Channel keys establishment .7 5.2.1 Authentication steps7 5.2.2 S
9、ession Key creation.8 5.2.3 Computation of channel keys9 5.2.4 Computation of the send sequence counter SSC.10 5.3 Secure Messaging Mode 10 5.3.1 CLA byte 10 5.3.2 TLV coding of command and response message10 5.3.3 Treatment of SM-Errors10 5.3.4 Padding for checksum calculation 11 5.3.5 Message stru
10、cture of Secure Messaging APDUs11 5.3.5.1 Cryptograms11 5.3.5.2 Cryptographic Checksums 13 Annex A (normative): Use of TDES and AES .15 Annex B (informative): Major changes from previous versions17 History 18 ETSI ETSI TS 102 176-2 V1.2.1 (2005-07) 4 Intellectual Property Rights IPRs essential or po
11、tentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essenti
12、al, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No
13、 guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Specification (TS) has been produced by ETSI Technical Committee Electro
14、nic Signatures and Infrastructures (ESI). The present document is part 2 of a multi-part deliverable covering the Algorithms and Parameters for Secure Electronic Signatures, as identified below: Part 1: “Hash functions and asymmetric algorithms“; Part 2: “Secure channel protocols and algorithms for
15、signature creation devices“. Introduction The present document provides for security and interoperability for the application of the underlying mathematical algorithms and related parameters for electronic signatures in accordance with the Directive 1999/93/EC 1 of the European Parliament and of the
16、 Council of 13 December 1999 on a Community framework for electronic signatures. The first part of the present document defines a list of cryptographic algorithms together with the requirements on their parameters, as well as the recommended combinations of algorithms in the form of “signature suite
17、s“ to be used with the data structures defined in the documents developed under the EESSI (European Electronic Signature Standardization Initiative). The present document contains several informative annexes which provide useful information on a number of subjects mentioned in the text. The present
18、part of this technical standard (symmetric algorithms and protocols for secure channels) defines a list of symmetric algorithms and protocols to be used with protocols to construct a secure channel between an application and a signature creation device (SCDev) providing either only integrity or both
19、 integrity and confidentiality. Such a secure channel may be used during the operational phase of a signature creation device to remotely download a private key in the signature creation device, remotely extract a public key from the signature creation device when the key pair has been generated by
20、the signature creation device or/and remotely download a public key certificate and associate it with a private key already stored in the signature creation device. With the kind permission of CEN Management Centre, some parts of the present document reproduce text from CEN Workshop Agreement (CWA)
21、(CWA 14890-1 7), a publication which is CEN copyright. Whereas the CWA 14890-1 is restricted to the usage of Triple DES (TDES) only, the present document gives a more general approach for the application of different symmetric algorithms. It recommends the usage of AES, the successor of DES, approve
22、d by NIST. ETSI ETSI TS 102 176-2 V1.2.1 (2005-07) 5 1 Scope The present document defines a set of symmetric algorithms and protocols to be used to construct a secure channel between an application and a signature creation device providing either only integrity or both integrity and confidentiality.
23、 Such a secure channel is required during the operational phase of a signature creation device to remotely download a private key in the signature creation device, remotely extract a public key from the signature creation device when the key pair has been generated by the signature creation device o
24、r/and remotely download a public key certificate and associate it with a private key already stored in the signature creation device. The protocols and algorithms defined in the present document are consistent with the following document: CWA 14890-1 7: “Application Interface for Smart Cards used as
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSITS10217622005ELECTRONICSIGNATURESANDINFRASTRUCTURESESIALGORITHMSANDPARAMETERSFORSECUREELECTRONICSIGNATURESPART2SECURECHANNELPROTOCOLSANDALGORITHMSFOR_1PDF

链接地址:http://www.mydoc123.com/p-738783.html