Information technology — Telecommunications and information exchange between systems — NFC Security — Part 2: NFC-SEC cryptography standard using ECDH and AES

ISO/IEC 13157-2:2016 specifies the message contents and the cryptographic methods for PID 01. ISO/IEC 13157-2:2016 specifies cryptographic mechanisms that use the Elliptic Curves Diffie-Hellman (ECDH) protocol for key agreement and the AES algorithm for data encryption and integrity.

Technologies de l'information — Téléinformatique — Sécurité NFC — Partie 2: Norme de cryptographie NFC-SEC utilisant ECDH et AES

General Information

Status
Published
Publication Date
28-Mar-2016
Current Stage
9093 - International Standard confirmed
Start Date
23-May-2025
Completion Date
24-May-2025
Ref Project

Relations

Buy Standard

Standard
ISO/IEC 13157-2:2016 - Information technology -- Telecommunications and information exchange between systems -- NFC Security
English language
17 pages
sale 15% off
Preview
sale 15% off
Preview
Standard
ISO/IEC 13157-2:2016 - Information technology — Telecommunications and information exchange between systems — NFC Security — Part 2: NFC-SEC cryptography standard using ECDH and AES Released:3/29/2016
English language
17 pages
sale 15% off
Preview
sale 15% off
Preview
Standard
ISO/IEC 13157-2:2016 - Information technology -- Telecommunications and information exchange between systems -- NFC Security
English language
17 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)


DRAFT INTERNATIONAL STANDARD ISO/IEC 13157-2
Attributed to ISO/IEC JTC 1 by the Central Secretariat

Voting begins on Voting terminates on
2015-09-14 2015-12-14
INTERNATIONAL ORGANIZATION FOR STANDARDIZATION  МЕЖДУНАРОДНАЯ ОРГАНИЗАЦИЯ ПО СТАНДАРТИЗАЦИИ  ORGANISATION INTERNATIONALE DE NORMALISATION
INTERNATIONAL ELECTROTECHNICAL COMMISSION  МЕЖДУНАРОДНАЯ ЭЛЕКТРОТЕХНИЧЕСКАЯ КОММИСИЯ  COMMISSION ÉLECTROTECHNIQUE INTERNATIONALE

FAST-TRACK PROCEDURE
Information technology — Telecommunications and information
exchange between systems — NFC Security —
Part 2:
NFC-SEC cryptography standard using ECDH and AES
Titre manque
Partie 2:
ICS 35.110
This draft International Standard is submitted for JTC 1 national body vote under the “fast-track”
procedure.
In accordance with Resolution 30 of the JTC 1 Berlin Plenary 1993, the proposer of this document
recommends assignment of ISO/IEC 13157-2 to JTC 1/SC 6.
The procedures used to develop this document are described in the ISO/IEC Directives, Part 1 -
Consolidated JTC 1 Supplement.

THIS DOCUMENT IS A DRAFT CIRCULATED FOR COMMENT AND APPROVAL. IT IS THEREFORE SUBJECT TO CHANGE AND MAY NOT BE
REFERRED TO AS AN INTERNATIONAL STANDARD UNTIL PUBLISHED AS SUCH.
IN ADDITION TO THEIR EVALUATION AS BEING ACCEPTABLE FOR INDUSTRIAL, TECHNOLOGICAL, COMMERCIAL AND USER PURPOSES,
DRAFT INTERNATIONAL STANDARDS MAY ON OCCASION HAVE TO BE CONSIDERED IN THE LIGHT OF THEIR POTENTIAL TO BECOME
STANDARDS TO WHICH REFERENCE MAY BE MADE IN NATIONAL REGULATIONS.
RECIPIENTS OF THIS DRAFT ARE INVITED TO SUBMIT, WITH THEIR COMMENTS, NOTIFICATION OF ANY RELEVANT PATENT RIGHTS OF WHICH
THEY ARE AWARE AND TO PROVIDE SUPPORTING DOCUMENTATION.
International Organization for Standardization, 2015
©
International Electrotechnical Commission, 2015

ISO/IEC DIS 13157-2
©  ISO/IEC 2015
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form or by any
means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission.
Permission can be requested from either ISO at the address below or ISO’s member body in the country of the requester.
ISO copyright office
Case postale 56  CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO/IEC 2015 — All rights reserved

ISO/IEC DIS 13157-2:2015(E)
Contents Page
Foreword . v
Introduction . vi
1  Scope . 1
2  Conformance . 1
3  Normative references . 1
4  Terms and definitions . 2
5  Conventions and notations . 2
5.1  Concatenation . 2
5.2  Hexadecimal numbers . 2
6  Acronyms . 2
7  General . 3
8  Protocol Identifier (PID) . 3
9  Primitives . 3
9.1  Key agreement . 4
9.1.1  Curve P-192 . 4
9.1.2  EC Key Pair Generation Primitive . 4
9.1.3  EC Public key validation . 4
9.1.4  ECDH secret value derivation Primitive . 4
9.1.5  Random nonces . 4
9.2  Key Derivation Functions . 5
9.2.1  KDF for the SSE . 5
9.2.2  KDF for the SCH . 5
9.3  Key Usage . 5
9.4  Key Confirmation . 6
9.4.1  Key confirmation tag generation . 6
9.4.2  Key confirmation tag verification . 6
9.5  Data Encryption . 6
9.5.1  Initial value of counter (IV) . 6
9.5.2  Encryption . 6
9.5.3  Decryption . 7
9.6  Data Integrity . 7
9.6.1  Protect data integrity . 7
9.6.2  Check data integrity . 7
9.7  Message Sequence Integrity . 7
10  Data Conversions . 7
10.1  Integer-to-Octet-String Conversion . 7
10.2  Octet-String-to-Integer Conversion . 7
10.3  Point-to-Octet-String Conversion . 8
10.4  Octet-String-to-Point Conversion . 8
11  SSE and SCH service invocation . 8
11.1  Pre-requisites . 9
11.2  Key Agreement . 10
11.2.1  Sender (A) Transformation . 10
11.2.2  Recipient (B) Transformation . 10
11.3  Key Derivation . 11
11.3.1  Sender (A) Transformation . 11
© ISO/IEC 2014 — All rights reserved iii

ISO/IEC DIS 13157-2:2015(E)
11.3.2  Recipient (B) Transformation .11
11.4  Key Confirmation .11
11.4.1  Sender (A) Transformation .11
11.4.2  Recipient (B) Transformation .12
12  SCH data exchange .12
12.1  Preparation .13
12.2  Data Exchange .13
12.2.1  Send .13
12.2.2  Receive .13
Annex A (normative) AES-XCBC-PRF-128 and AES-XCBC-MAC-96 algorithms .15
A.1  AES-XCBC-PRF-128 .15
A.2  AES-XCBC-MAC-96.15
Annex B (normative) Fields sizes .16
Annex C (informative) Informative references .17

iv © ISO/IEC 2015 — All rights reserved

ISO/IEC DIS 13157-2:2015(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are members of
ISO or IEC participate in the development of International Standards through technical committees
established by the respective organization to deal with particular fields of technical activity. ISO and IEC
technical committees collaborate in fields of mutual interest. Other international organizations, governmental
and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information
technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of the joint technical committee is to prepare International Standards. Draft International
Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as
an International Standard requires approval by at least 75 % of the national bodies casting a vote.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.
ISO/IEC 13157-2 was prepared by Ecma International (as ECMA-386) and was adopted, under a special
“fast-track procedure”, by Joint Technical Committee ISO/IEC JTC 1, Information technology, in parallel with
its approval by national bodies of ISO and IEC.
ISO/IEC 13157 consists of the following parts, under the general title Information technology —
Telecommunications and information exchange between systems — NFC Security:
— Part 1: NFC-SEC NFCIP-1 security services and protocol
— Part 2: NFC-SEC cryptography standard using ECDH and AES
— Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM
— Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography
— Part 5: NFC-SEC entity authentication and key agreement using symmetric cryptography.

© ISO/IEC 2014 — All rights reserved v

ISO/IEC DIS 13157-2:2015(E)
Introduction
The NFC Security series of standards comprise a common services and protocol Standard and NFC-
SEC cryptography standards.
This NFC-SEC cryptography Standard specifies cryptographic mechanisms that use the Elliptic Curves
Diffie-Hellman (ECDH) protocol for key agreement and the AES algorithm for data encryption and
integrity.
This International Standard addresses secure communication of two NFC devices that do not share
any common secret data ("keys") be
...


INTERNATIONAL ISO/IEC
STANDARD 13157-2
Second edition
2016-04-01
Information technology —
Telecommunications and information
exchange between systems — NFC
Security —
Part 2:
NFC-SEC cryptography standard using
ECDH and AES
Technologies de l’information — Téléinformatique — Sécurité NFC —
Partie 2: Norme de cryptographie NFC-SEC utilisant ECDH et AES
Reference number
©
ISO/IEC 2016
© ISO/IEC 2016, Published in Switzerland
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of
the requester.
ISO copyright office
Ch. de Blandonnet 8 • CP 401
CH-1214 Vernier, Geneva, Switzerland
Tel. +41 22 749 01 11
Fax +41 22 749 09 47
copyright@iso.org
www.iso.org
ii © ISO/IEC 2016 – All rights reserved

Contents Page
Foreword . v
Introduction . vi
1 Scope . 1
2 Conformance . 1
3 Normative references . 1
4 Terms and definitions . 2
5 Conventions and notations . 2
5.1 Concatenation . 2
5.2 Hexadecimal numbers . 2
6 Acronyms . 2
7 General . 3
8 Protocol Identifier (PID) . 3
9 Primitives . 3
9.1 Key agreement . 4
9.1.1 Curve P-192 . 4
9.1.2 EC Key Pair Generation Primitive . 4
9.1.3 EC Public key validation . 4
9.1.4 ECDH secret value derivation Primitive . 4
9.1.5 Random nonces . 4
9.2 Key Derivation Functions . 5
9.2.1 KDF for the SSE . 5
9.2.2 KDF for the SCH . 5
9.3 Key Usage . 5
9.4 Key Confirmation . 6
9.4.1 Key confirmation tag generation . 6
9.4.2 Key confirmation tag verification . 6
9.5 Data Encryption . 6
9.5.1 Initial value of counter (IV) . 6
9.5.2 Encryption . 6
9.5.3 Decryption . 7
9.6 Data Integrity . 7
9.6.1 Protect data integrity. 7
9.6.2 Check data integrity . 7
9.7 Message Sequence Integrity . 7
10 Data Conversions . 7
10.1 Integer-to-Octet-String Conversion . 7
10.2 Octet-String-to-Integer Conversion . 7
10.3 Point-to-Octet-String Conversion . 8
10.4 Octet-String-to-Point Conversion . 8
11 SSE and SCH service invocation . 8
11.1 Pre-requisites . 9
11.2 Key Agreement . 10
11.2.1 Sender (A) Transformation . 10
11.2.2 Recipient (B) Transformation . 10
11.3 Key Derivation . 11
11.3.1 Sender (A) Transformation . 11
© ISO/IEC 2016 — All rights reserved iii

11.3.2 Recipient (B) Transformation . 11
11.4 Key Confirmation . 11
11.4.1 Sender (A) Transformation . 11
11.4.2 Recipient (B) Transformation . 12
12 SCH data exchange . 12
12.1 Preparation . 13
12.2 Data Exchange . 13
12.2.1 Send . 13
12.2.2 Receive . 13
Annex A (normative) AES-XCBC-PRF-128 and AES-XCBC-MAC-96 algorithms. 15
A.1 AES-XCBC-PRF-128. 15
A.2 AES-XCBC-MAC-96. 15
Annex B (normative) Fields sizes . 16
Annex C (informative) Informative references . 17

iv © ISO/IEC 2016 — All rights reserved

Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are members of
ISO or IEC participate in the development of International Standards through technical committees
established by the respective organization to deal with particular fields of technical activity. ISO and IEC
technical committees collaborate in fields of mutual interest. Other international organizations, governmental
and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information
technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
The procedures used to develop this document and those intended for its further maintenance are described
in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the different types of
document should be noted. This document was drafted in accordance with the editorial rules of the
ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. Details of any
patent rights identified during the development of the document will be in the Introduction and/or on the ISO
list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation on the meaning of ISO specific terms and expressions related to conformity assessment,
as well as information about ISO's adherence to the WTO principles in the Technical Barriers to Trade (TBT)
see the following URL: Foreword - Supplementary information
ISO/IEC 13157-2 was prepared by Ecma International (as ECMA-386) and was adopted, under a special
“fast-track procedure”, by Joint Technical Committee ISO/IEC JTC 1, Information technology, in parallel with
its approval by national bodies of ISO and IEC.
This second edition cancels and replaces the first edition (ISO/IEC 13157-2:2010) which has been technically
revised.
ISO/IEC 13157 consists of the following parts, under the general title Information technology —
Telecommunications and information exchange between systems — NFC Security:
— Part 1: NFC-SEC NFCIP-1 security services and protocol
— Part 2: NFC-SEC cryptography standard using ECDH and AES
— Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM
— Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography
— Part 5: NFC-SEC entity authentication and key agreement using symmetric cryptography

To be published.
© ISO/IEC 2016 — All rights reserved v

Introduction
The NFC Security series of standards comprise a common services and protocol Standard and NFC-
SEC cryptography standards.
This NFC-SEC cryptography Standard specifies cryptographic mechanisms that use the Elliptic Curves
Diffie-Hellman (ECDH) protocol for key agreement and the AES algorithm for data encryption and
integrity.
This International Standard addresses secure communication of two NFC devices that do not share
any common secret data ("keys") before they start communicating which each other.
This edition ensures to use the latest references to cryptographic standards.

vi © ISO/IEC 2016 — All rights reserved

INTERNATIONAL STANDARD ISO/IEC 13157-2:2016(E)

Information technology — Telecommunications and information
exchange between systems — NFC Security —
Part 2:
NFC-SEC cryptography standard using ECDH and AES
1 Scope
This International Standard specifies the message contents and the cryptographic methods for PID 01.
This International Standard specifies cryptographic mechanisms that use the Elliptic Curves Diffie-Hellman
(ECDH) protocol for key agreement and the AES algorithm for data encryption and integr
...


INTERNATIONAL ISO/IEC
STANDARD 13157-2
Second edition
2016-04-01
Information technology —
Telecommunications and information
exchange between systems — NFC
Security —
Part 2:
NFC-SEC cryptography standard using
ECDH and AES
Technologies de l’information — Téléinformatique — Sécurité NFC —
Partie 2: Norme de cryptographie NFC-SEC utilisant ECDH et AES
Reference number
©
ISO/IEC 2016
© ISO/IEC 2016, Published in Switzerland
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of
the requester.
ISO copyright office
Ch. de Blandonnet 8 • CP 401
CH-1214 Vernier, Geneva, Switzerland
Tel. +41 22 749 01 11
Fax +41 22 749 09 47
copyright@iso.org
www.iso.org
ii © ISO/IEC 2016 – All rights reserved

Contents Page
Foreword . v
Introduction . vi
1 Scope . 1
2 Conformance . 1
3 Normative references . 1
4 Terms and definitions . 2
5 Conventions and notations . 2
5.1 Concatenation . 2
5.2 Hexadecimal numbers . 2
6 Acronyms . 2
7 General . 3
8 Protocol Identifier (PID) . 3
9 Primitives . 3
9.1 Key agreement . 4
9.1.1 Curve P-192 . 4
9.1.2 EC Key Pair Generation Primitive . 4
9.1.3 EC Public key validation . 4
9.1.4 ECDH secret value derivation Primitive . 4
9.1.5 Random nonces . 4
9.2 Key Derivation Functions . 5
9.2.1 KDF for the SSE . 5
9.2.2 KDF for the SCH . 5
9.3 Key Usage . 5
9.4 Key Confirmation . 6
9.4.1 Key confirmation tag generation . 6
9.4.2 Key confirmation tag verification . 6
9.5 Data Encryption . 6
9.5.1 Initial value of counter (IV) . 6
9.5.2 Encryption . 6
9.5.3 Decryption . 7
9.6 Data Integrity . 7
9.6.1 Protect data integrity. 7
9.6.2 Check data integrity . 7
9.7 Message Sequence Integrity . 7
10 Data Conversions . 7
10.1 Integer-to-Octet-String Conversion . 7
10.2 Octet-String-to-Integer Conversion . 7
10.3 Point-to-Octet-String Conversion . 8
10.4 Octet-String-to-Point Conversion . 8
11 SSE and SCH service invocation . 8
11.1 Pre-requisites . 9
11.2 Key Agreement . 10
11.2.1 Sender (A) Transformation . 10
11.2.2 Recipient (B) Transformation . 10
11.3 Key Derivation . 11
11.3.1 Sender (A) Transformation . 11
© ISO/IEC 2016 — All rights reserved iii

11.3.2 Recipient (B) Transformation . 11
11.4 Key Confirmation . 11
11.4.1 Sender (A) Transformation . 11
11.4.2 Recipient (B) Transformation . 12
12 SCH data exchange . 12
12.1 Preparation . 13
12.2 Data Exchange . 13
12.2.1 Send . 13
12.2.2 Receive . 13
Annex A (normative) AES-XCBC-PRF-128 and AES-XCBC-MAC-96 algorithms. 15
A.1 AES-XCBC-PRF-128. 15
A.2 AES-XCBC-MAC-96. 15
Annex B (normative) Fields sizes . 16
Annex C (informative) Informative references . 17

iv © ISO/IEC 2016 — All rights reserved

Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are members of
ISO or IEC participate in the development of International Standards through technical committees
established by the respective organization to deal with particular fields of technical activity. ISO and IEC
technical committees collaborate in fields of mutual interest. Other international organizations, governmental
and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information
technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
The procedures used to develop this document and those intended for its further maintenance are described
in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the different types of
document should be noted. This document was drafted in accordance with the editorial rules of the
ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. Details of any
patent rights identified during the development of the document will be in the Introduction and/or on the ISO
list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation on the meaning of ISO specific terms and expressions related to conformity assessment,
as well as information about ISO's adherence to the WTO principles in the Technical Barriers to Trade (TBT)
see the following URL: Foreword - Supplementary information
ISO/IEC 13157-2 was prepared by Ecma International (as ECMA-386) and was adopted, under a special
“fast-track procedure”, by Joint Technical Committee ISO/IEC JTC 1, Information technology, in parallel with
its approval by national bodies of ISO and IEC.
This second edition cancels and replaces the first edition (ISO/IEC 13157-2:2010) which has been technically
revised.
ISO/IEC 13157 consists of the following parts, under the general title Information technology —
Telecommunications and information exchange between systems — NFC Security:
— Part 1: NFC-SEC NFCIP-1 security services and protocol
— Part 2: NFC-SEC cryptography standard using ECDH and AES
— Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM
— Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography
— Part 5: NFC-SEC entity authentication and key agreement using symmetric cryptography

To be published.
© ISO/IEC 2016 — All rights reserved v

Introduction
The NFC Security series of standards comprise a common services and protocol Standard and NFC-
SEC cryptography standards.
This NFC-SEC cryptography Standard specifies cryptographic mechanisms that use the Elliptic Curves
Diffie-Hellman (ECDH) protocol for key agreement and the AES algorithm for data encryption and
integrity.
This International Standard addresses secure communication of two NFC devices that do not share
any common secret data ("keys") before they start communicating which each other.
This edition ensures to use the latest references to cryptographic standards.

vi © ISO/IEC 2016 — All rights reserved

INTERNATIONAL STANDARD ISO/IEC 13157-2:2016(E)

Information technology — Telecommunications and information
exchange between systems — NFC Security —
Part 2:
NFC-SEC cryptography standard using ECDH and AES
1 Scope
This International Standard specifies the message contents and the cryptographic methods for PID 01.
This International Standard specifies cryptographic mechanisms that use the Elliptic Curves Diffie-Hellman
(ECDH) protocol for key agreement and the AES algorithm for data encryption and integr
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.