Information technology - Telecommunications and information exchange between systems - NFC Security - Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography

ISO/IEC 13157-4:2016 specifies the message contents and the cryptographic mechanisms for PID 03. ISO/IEC 13157-4:2016 specifies key agreement and confirmation mechanisms providing mutual authentication, using asymmetric cryptography, and the transport protocol requirements for the exchange between Sender and TTP. NOTE ISO/IEC 13157-4:2016 adds entity authentication to the services provided by ISO/IEC 13157-3 (ECMA-409) NFC-SEC-02.

Technologies de l'information — Télécommunications et échange d'information entre systèmes — Sécurité NFC — Partie 4: Authentification d'entité NFC-SEC et accord de clés utilisant une cryptographie asymétrique

General Information

Status
Published
Publication Date
09-Jun-2016
Current Stage
9093 - International Standard confirmed
Start Date
23-May-2025
Completion Date
30-Oct-2025

Overview

ISO/IEC 13157-4:2016 defines NFC-SEC entity authentication and key agreement using asymmetric cryptography. Part 4 of the NFC Security series (PID 03) specifies message contents, cryptographic mechanisms and transport protocol requirements for mutual authentication and key agreement between NFC entities (Sender, Recipient) and optional Trusted Third Parties (TTP). It extends services in ISO/IEC 13157-3 by adding entity authentication for Shared Secret Service (SSE) and Secure Channel Service (SCH).

Keywords: NFC security, NFC-SEC, ISO/IEC 13157-4, entity authentication, asymmetric cryptography, mutual authentication.

Key topics and technical requirements

  • NEAU-A mechanism: Defines NFC Entity Authentication using asymmetric cryptography for mutual authentication and key agreement.
  • Message formats and PDUs: Fields, protocol identifiers (PID 03), and NFC-SEC PDUs are specified for interoperability.
  • Entity identifiers and certificates: Use of certificates (CertA, CertB, CertTTP) and X.509-style validation for authenticating public keys.
  • Asymmetric algorithms and signatures: Support for elliptic-curve based mechanisms including EC curve selection and ECDSA for digital signatures (ECDSA test vectors provided in Annex B).
  • Key agreement and confirmation: Procedures for deriving shared keys, key confirmation and Key Derivation Function (KDF) usage to produce session keys for SSE and SCH.
  • TTP interaction: Transport and policy negotiation between Sender and TTP, including certificate validation responsibilities of TTP implementations.
  • Transport considerations: Protocol transport requirements and an informative Annex A covering UDP port 5111 and the TAEP packet format for TTP exchanges.
  • Conformance: Entities must also conform to ISO/IEC 13157-1 and related cryptography parts (Part 2/3) and referenced standards such as ISO/IEC 9798-1, ISO/IEC 11770-3 and X.509.

Practical applications and who uses it

  • NFC device manufacturers: Implementers of secure NFC stacks (readers, tags, mobile devices) to provide interoperable mutual authentication and secure channels.
  • Payment and transit systems: Operators and vendors who need authenticated key agreement for contactless payments, ticketing and transit passes.
  • Access control and identity: Providers of secure NFC access cards, smartcards and mobile access credentials requiring certificate-based authentication.
  • Security architects and software developers: Designers building NFC-secured applications that rely on asymmetric key mechanisms, certificate validation and standard KDF/signature processes.
  • TTP implementers and service providers: Entities operating certificate validation or policy negotiation services for NFC ecosystems.

Related standards

  • ISO/IEC 13157-1 (NFC-SEC services & protocol)
  • ISO/IEC 13157-2 and -3 (NFC-SEC cryptography standards)
  • ISO/IEC 9798-1 / 9798-3 (entity authentication)
  • ISO/IEC 11770-3 (key management using asymmetric techniques)
  • ITU-T X.509 (public-key certificates)

ISO/IEC 13157-4:2016 is essential when building secure, standards-compliant NFC authentication and key-agreement flows that use asymmetric cryptography and certificate-based trust.

Standard

ISO/IEC 13157-4:2016 - Information technology — Telecommunications and information exchange between systems — NFC Security — Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography Released:6/10/2016

English language
25 pages
sale 15% off
Preview
sale 15% off
Preview

Frequently Asked Questions

ISO/IEC 13157-4:2016 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information technology - Telecommunications and information exchange between systems - NFC Security - Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography". This standard covers: ISO/IEC 13157-4:2016 specifies the message contents and the cryptographic mechanisms for PID 03. ISO/IEC 13157-4:2016 specifies key agreement and confirmation mechanisms providing mutual authentication, using asymmetric cryptography, and the transport protocol requirements for the exchange between Sender and TTP. NOTE ISO/IEC 13157-4:2016 adds entity authentication to the services provided by ISO/IEC 13157-3 (ECMA-409) NFC-SEC-02.

ISO/IEC 13157-4:2016 specifies the message contents and the cryptographic mechanisms for PID 03. ISO/IEC 13157-4:2016 specifies key agreement and confirmation mechanisms providing mutual authentication, using asymmetric cryptography, and the transport protocol requirements for the exchange between Sender and TTP. NOTE ISO/IEC 13157-4:2016 adds entity authentication to the services provided by ISO/IEC 13157-3 (ECMA-409) NFC-SEC-02.

ISO/IEC 13157-4:2016 is classified under the following ICS (International Classification for Standards) categories: 35.110 - Networking. The ICS classification helps identify the subject area and facilitates finding related standards.

You can purchase ISO/IEC 13157-4:2016 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.

Standards Content (Sample)


INTERNATIONAL ISO/IEC
STANDARD 13157-4
First edition
��16��6�15
Information technology —
Telecommunications and information
exchange between systems — NFC
Security —
Part 4:
NFC-SEC entity authentication and
key agreement using asymmetric
cryptography
Technologies de l’information — Télécommunications et échange
d’information entre systèmes — Sécurité NFC —
Partie 4: Authentification d’entité NFC-SEC et accord de clés utilisant
une cryptographie asymétrique
Reference number
©
ISO/IEC 2016
© ISO/IEC 2016, Published in Switzerland
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of
the requester.
ISO copyright office
Ch. de Blandonnet 8 • CP 401
CH-1214 Vernier, Geneva, Switzerland
Tel. +41 22 749 01 11
Fax +41 22 749 09 47
copyright@iso.org
www.iso.org
ii © ISO/IEC 2016 – All rights reserved

Contents Page
Foreword . v
Introduction . vi
1  Scope . 1
2  Conformance . 1
3  Normative references . 1
4  Terms and definitions . 1
5  Conventions and notations . 3
6  Acronyms . 3
7  General . 4
8  Fields and PDUs for NEAU-A . 5
8.1  Protocol Identifier (PID) . 5
8.2  NFC-SEC-PDUs . 5
8.3  TTP involving . 6
8.3.1  TTP policy and field . 6
8.3.2  TTP policy negotiation . 6
8.4  Entity identifiers . 7
8.5  Cert field . 7
8.6  Res field . 7
9  Primitives . 8
9.1  General requirements . 8
9.2  Entity authentication . 9
9.2.1  Mechanisms . 9
9.2.2  EC curve . 10
9.2.3  ECDSA . 10
9.2.4  Certificate validation . 12
9.3  Key agreement . 13
9.4  Key confirmation . 13
9.5  Key Derivation Function (KDF) . 13
10  NEAU-A mechanism . 13
10.1  Entity authentication involving a TTP . 13
10.1.1  Protocol overview . 13
10.1.2  Preparation . 14
10.1.3  Sender (A) transformation . 14
10.1.4  Recipient (B) transformation . 16
10.1.5  TTP transformation . 17
10.2  Entity authentication without involving a TTP . 17
10.2.1  Protocol overview . 17
10.2.2  Preparation . 17
10.2.3  Sender (A) transformation . 18
10.2.4  Recipient (B) transformation . 19
10.3  Key derivation . 20
10.3.1  Sender (A) . 20
10.3.2  Recipient (B) . 20
11  Data Authenticated Encryption in SCH . 20
Annex A (normative) UDP Port 5111 and TAEP . 21
A.1 UDP and port 5111 . 21
© ISO/IEC 2016 — All rights reserved iii

A.1.1  UDP .21
A.1.2  Port 5111 .21
A.2 TAEP .22
A.2.1  TAEP packet format .22
A.2.2  TAEP_REQ and TAEP_RES format .22
Annex B (informative) ECDSA test vectors .24
Bibliography .27
iv © ISO/IEC 2016 — All rights reserved

Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are members of
ISO or IEC participate in the development of International Standards through technical committees
established by the respective organization to deal with particular fields of technical activity. ISO and IEC
technical committees collaborate in fields of mutual interest. Other international organizations, governmental
and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information
technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
The procedures used to develop this document and those intended for its further maintenance are described
in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the different types of
document should be noted. This document was drafted in accordance with the editorial rules of the ISO/IEC
Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. Details of any
patent rights identified during the development of the document will be in the Introduction and/or on the ISO
list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation on the meaning of ISO specific terms and expressions related to conformity assessment,
as well as information about ISO's adherence to the World Trade Organization (WTO) principles in the
Technical Barriers to Trade (TBT) see the following URL: www.iso.org/iso/foreword.html.
ISO/IEC 13157-4 was prepared by Ecma International (as ECMA-410) and was adopted, under a
special “fast-track procedure”, by Joint Technical Committee ISO/IEC JTC 1, Information technology, in
parallel with its approval by national bodies of ISO and IEC.
ISO/IEC 13157 consists of the following parts, under the general title Information technology —
Telecommunications and information exchange between systems — NFC Security:
— Part 1: NFC-SEC NFCIP-1 security services and protocol
— Part 2: NFC-SEC cryptography standard using ECDH and AES
— Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM
— Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography
— Part 5: NFC-SEC entity authentication and key agreement using symmetric cryptography.
© ISO/IEC 2016 — All rights reserved v

Introduction
The NFC Security series of standards comprise a common services and protocol Standard and NFC-
SEC cryptography standards.
This NFC-SEC cryptography Standard specifies an NFC Entity Authentication (NEAU) mechanism that
uses the asymmetric cryptography algorithm (NEAU-A) for mutual authentication of two NFC entities.
This International Standard addresses entity authentication of two NFC entities possessing certificates
and private keys during key agreement and key confirmation for the Shared Secret Service (SSE) and
Secure Channel Service (SCH).
This International Standard adds entity authentication to the services provided by ISO/IEC 13157-3 (ECMA-
409) NFC-SEC-02.
This International Standard refers to the latest standards.
The holders of these patent rights have assured the ISO and IEC that they are willing to negotiate
licences under reasonable and non-discriminatory terms and conditions with applicants throughout the
world.
In this respect, the statements of the holders of these patent rights are registered with ISO and IEC.
Information on the declared patents may be obtained from:
Patent Holder: China IWNCOMM Co., Ltd.
nd
Address: A201, QinFengGe, Xi’an Software Park, No. 68, Keji 2 Road, Xi’an Hi-Tech Industrial,
Development Zone, Xi’an, Shaanxi, P. R. China 710075
vi © ISO/IEC 2016 — All rights reserved

INTERNATIONAL STANDARD ISO/IEC 13157-4:2016(E)
Information technology — Telecommunications and information
exchange between systems — NFC Security —
Part 4:
NFC-SEC entity authentication and key agreement using asymmetric
cryptography
1 Scope
This International Standard specifies the message contents and the cryptographic mechanisms for PID 03.
This International Standard specifies key agreement and confirmation mechanisms providing mutual
authentication, using asymmetric cryptography, and the transport protocol requirements for the
exchange between Sender and TTP.
NOTE This International Standard adds entity authentication to the services provided by ISO/IEC 13157-3 (ECMA-409)
NFC-SEC-02.
2 Conformance
Conformant NFC-SEC entities employ the security mechanisms and the transport protocol requirements
specified in this NFC-SEC cryptography Standard (identified by PID 03) and conform to ISO/IEC 13157-1
(ECMA-385).
Conformant TTP implementations employ the security mechanisms and the transport protocol requirements
specified in this NFC-SEC cryptography Standard (identified by PID 03).
The NFC-SEC security services shall be established through the protocol specified in ISO/IEC 13157-1
(ECMA-385) and the mechanisms specified in this International Standard.
3 Normative references
The following referenced documents are indispensable for the application of this document. For dated
references, only the edition cited applies. For undated references, the latest edition of the referenced
document (including any amendments) applies.
ISO/IEC 7498-1:1994, Information technology -- Open Systems Interconnection -- Basic Reference Model:
The Basic Model
ISO/IEC 9798-1:2010, Information technology -- Security techniques -- Entity authentication -- Part 1: General
ISO/IEC 9798-3, Information technology -- Security techniques -- Entity authentication -- Part 3: Mechanisms
using digital signature techniques
ISO/IEC 10118-3:2004, Information technology -- Security techniques -- Hash-functions -- Part 3: Dedicated
hash-functions
© ISO/IEC 2016 — All rights reserved 1

ISO/IEC 11770-3, Information technology -- Security techniques -- Key management -- Part 3: Mechanisms
using asymmetric techniques
ISO/IEC 13157-1, Information technology -- Telecommunications and information exchange between systems
-- NFC Security -- Part 1: NFC-SEC NFCIP-1 security services and protocol (ECMA-385)
ISO/IEC 13157-2, Information technology -- Telecommunications and information exchange between systems
-- NFC Security -- Part 2: NFC-SEC cryptography standard using ECDH and AES (ECMA-386)
ISO/IEC 13157-3, Information technology -- Telecommunications and information exchange between systems
-- NFC Security -- Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM (ECMA-409)
ISO/IEC 14443-3, Identification cards -- Contactless integrated circuit cards -- Proximity cards -- Part 3:
Initialization and anticollision
ISO/IEC 14888-3:2006, Information technology -- Security techniques -- Digital signatures with appendix --
Part 3: Discrete logarithm based mechanisms
ISO/IEC 18031:2011, Information technology -- Security techniques -- Random bit generation
ISO/IEC 18031:2011/Cor.1:2014, Information technology -- Security techniques -- Random bit generation --
Technical Corrigendum 1
ISO/IEC 18092, Information technology -- Telecommunications and information exchange between systems --
Near Field Communication -- Interface and Protocol (NFCIP-1) (ECMA-340)
ITU-T Recommendation X.509, ISO/IEC 9594-8, Information technology -- Open Systems Interconnection --
The Directory: Public-key and attribute certificate frameworks.
4 Terms and definitions
For the purposes of this document, the terms and definitions given in Clause 4 of ISO/IEC 13157-3 (ECMA-
409) and the following apply.
4.1
asymmetric cryptography (asymmetric cryptographic technique)
cryptographic technique that uses two related transformations: a public transformation (defined by the public
key) and a private transformation (defined by the private key)
NOTE The two transformations have the property that, given the public transformation, it is computationally infeasible
to derive the private transformation.
[ISO/IEC 9798-1: 2010]
4.2
certificate
public key information of an entity signed by the certification authority and thereby rendered unforgeable
[ISO/IEC 9798-1: 2010]
4.3
digital signature (signature)
data appended to, or a cryptographic transformation of, a data unit that allows the recipient of the data unit to
prove the source and integrity of the data unit and protect against forgery, e.g. by the recipient
[ISO/IEC 9798-1: 2010]
2 © ISO/IEC 2016 — All rights reserved

4.4
entity authentication
corroboration that an entity is the one claimed
[ISO/IEC 9798-1: 2010]
4.5
n-entity-title
a name that is used to identify unambiguously an n-entity
[ISO/IEC 7498-1: 1994]
4.6
trusted third party
security authority or its agent, trusted by other entities with respect to security related activities
[ISO/IEC 9798-1: 2010]
NOTE In this International Standard, a trusted third party is trusted by a Sender and Recipient for the purposes of
certificate validation.
5 Conventions and notations
Clause 5 of ISO/IEC 13157-3 (ECMA-409) applies.
For any message field “F”, F denotes the value placed in the field upon sending, F’ the value upon receipt.
6 Acronyms
Clause 6 of ISO/IEC 13157-3 (ECMA-409) applies. Additionally, the following acronyms apply.
CertA Certificate of A
CertB Certificate of B
CertTTP Certificate of TTP
CPA Public Key of Certificate of A
CPB Public Key of Certificate of B
CPTTP Public Key of Certificate of TTP
CSA Private Key corresponding to Certificate of A
CSB Private Key corresponding to Certificate of B
CSTTP Private Key corresponding to Certificate of TTP
Dual_EC_DRBG Dual Elliptic Curve Deterministic Random Bit Generator
ECDSA Elliptic Curve Digital Signature Algorithm
IP Internet Protocol
k Fresh random value in ECDSA
NEAU NFC Entity Authentication
NEAU-A NEAU using Asymmetric Cryptography
OCSP Online Certificate Status Protocol
q 224-bit prime number of a divisor of the curve order in ECDSA
© ISO/IEC 2016 — All rights reserved 3

r, s Digital Signature value of ECDSA
ResA Validation result of A
ResB Validation result of B
SHA Secure Hash Algorithm
SigA Digital Signature generated by A
SigB Digital Signature generated by B
SigTTP Digital Signature generated by TTP
TTP PolicyX TTP policy of entity X [see 8.3]
TLV Type-length-value
UDP User Datagram Protocol
UID Unique Identifier [ISO/IEC 14443-3]
TAEP Tri-element Authentication Extensible Protocol
TAEP_REQ TAEP Request PDU
TAEP_RES TAEP Response PDU
TTP Trusted Third Party involved in the authentication
7 General
This International Standard specifies the NFC Entity Authentication using Asymmetric cryptography (NEAU-
A), using the key agreement and confirmation protocol of ISO/IEC 13157-1 (ECMA-385). NEAU-A specifies
negotiation of authentication either involving a TTP per 6.2 of ISO/IEC 9798-3 or without TTP per 5.2.2 of
ISO/IEC 9798-3.
Authentication credentials shall be Public Key Certificates conforming to ISO/IEC 9594-8 / ITU X.509.
NOTE It is outside the scope of this International Standard how the certificates and the related private keys are issued
and established.
The relationship between NEAU-A and ISO/IEC 13157-1 (ECMA-385) is shown in Figure 1.
4 © ISO/IEC 2016 — All rights reserved

Figure 1 — The use of the NFC-SEC protocol by NEAU-A
8 Fields and PDUs for NEAU-A
8.1 Protocol Identifier (PID)
This International Standard shall use the one octet protocol identifier PID with value 3.
8.2 NFC-SEC-PDUs
Peer NFC-SEC entities shall establish a shared secret Z using ACT_REQ, ACT_RES, VFY_REQ and
VFY_RES according to the NEAU-A mechanism.
© ISO/IEC 2016 — All rights reserved 5

8.3 TTP involving
8.3.1 TTP policy and field
TTP Policy specifies the entity policy regarding the involvement of the TTP in NEAU-A. The payload of
X
ACT_REQ and ACT_RES shall contain the 1-octect TTP field encoding the TTP Policy as follows:
X
a) 0: TTP to be involved;
b) 1: TTP not to be involved;
c) 2: No preference;
d) All other values are RFU.
8.3.2 TTP policy negotiation
The NEAU-A mechanism provides a method for TTP policy negotiation. Peer NFC-SEC entities shall
negotiate whether or not to involve the TTP, in accordance with their TTP Policy .
X
The Sender (A) shall include a TTP field in the ACT_REQ with the value (0, 1 or 2) according to its TTP
Policy . If the TTP is unavailable (see 10.1.2) then the values 0 and 2 are prohibited. The value 2 shall be
A
replaced by 1, and if the value is 0 then ‘PDU content valid’ shall be set to false.
Upon receiving the ACT-REQ, the Recipient (B) shall perform policy negotiation as specified in Table 1; if the
Result is False then the Recipient shall set ‘PDU content valid’ to false, for the Result of 0 or 1, the Recipient
(B) shall set the TTP field in the ACT-RES to the Result and shall continue with step 3 of 10.1.4 or step 4 of
10.2.4 respectively.
The Sender (A) shall validate the TTP field in the ACT-RES:
y If it equals 2, then set ‘PDU content valid’ to false;
Otherwise, evaluate Table 1; if the Result is False then set ‘PDU content valid’ to false, for the Result of 0 or 1
continue with step 6 of 10.1.3 or 10.2.3 respectively.
Table 1 — Results of the TTP policy negotiation
TTP Field TTP Policy Result
0 TTP to be involved 0
0 TTP not to be involved False
0 No preference 0
1 TTP to be involved False
1 TTP not to be involved 1
1 No preference 1
2 TTP to be involved 0
2 TTP not to be involved 1
2 No preference 0
6 © ISO/IEC 2016 — All rights reserved

8.4 Entity identifiers
The n-entity-title of the Sender’s and Recipient’s n-entity shall be used as ID and ID , respectively. Figure 2
S R
specifies the encoding of ID and ID in the TLV format.
S R
Figure 2 — ID format
1. The Type subfield specifies the type of the ID and shall be 1 octet in length. The values are:
a) 1: Value subfield contains Sender (A) identification number, ID ;
S
b) 2: Value subfield contains Recipient (B) identification number, ID ;
R
c) All other values are RFU.
2. The 2-octet Length subfield contains the length in number of octets of the Value subfield, in the range of 1
to 65535.
8.5 Cert field
Figure 3 specifies the encoding of Cert , Cert and Cert in the TLV format.
A B TTP
Figure 3 — Cert format
1. The Cert Type subfield specifies the type of the certificate and shall be 1 octet in length. The values are:
a) 0: Value subfield contains certificate of Sender (A), Cert ;
A
b) 1: Value subfield contains certificate of Recipient (B), Cert ;
B
c) 2: Value subfield contains certificate of TTP, Cert ;
TTP
d) All other values are RFU.
2. The 2-octet Cert Length subfield contains the length in number of octets of the Value subfield, in the
range of 1 to 65535.
8.6 Res field
Figure 4 specifies the encoding of Res and Res in the TLV format.
A B
Figure 4 — Res format
© ISO/IEC 2016 — All rights reserved 7

1. The Res Type subfield identifies the entity and shall be 1 octet in length. The values are:
a) 0: result of Sender (A);
b) 1: result of Recipient (B);
c) All other values are RFU.
2. The 2-octet Res Length subfield contains the length in number of octets of the Certificate subfield of the
Value subfield, in the range of 1 to 65535.
3. Figure 5 specifies the Value subfield.
Figure 5 — Value format
a) The Flag subfield contains the certificate validation result, the values are:
i. 0: positive;
ii. 1: negative;
iii. All other values are RFU.
b) The Certificate subfield contains the certificate verified by the TTP.
9 Primitives
9.1 General requirements
Clause 9 specifies the cryptographic primitives of NEAU-A. Clause 10 specifies the use of these primitives.
Table 2 specifies the size and description of parameters.
Table 2 — NEAU-A parameters
Parameter Field Size Description
Cert Variable The certificate of A. See 8.5.
A
Cert Variable The certificate of B. See 8.5.
B
Cert Variable The certificate of TTP. See 8.5.
TTP
CP 512 bits Public key of certificate of A.
A
CP 512 bits Public key of certificate of B.
B
CP 512 bits Public key of certificate of TTP.
TTP
CS 256 bits Private key corresponding to certificate of A.
A
CS 256 bits Private key corresponding to certificate of B.
B
8 © ISO/IEC 2016 — All rights reserved

Parameter Field Size Description
CS 256 bits Private key corresponding to certificate of TTP.
TTP
TTP 8 bits This field specifies whether or not the TTP is involved.
Sig 512 bits Digital signature generated by A.
A
Sig 512 bits Digital signature generated by B.
B
Sig 512 bits Digital signature generated by TTP.
TTP
This field specifies the authenticate result of A. See 8.6.
Res Variable
A
This field specifies the authenticate result of B. See 8.6.
Res Variable
B
ID Variable The Sender (A) identification number. See 8.4.
S
ID Variable The Recipient (B) identification number. See 8.4.
R
NA 128 bits See Clause 6 of ISO/IEC 13157-2 (ECMA-386).
NB 128 bits See Clause 6 of ISO/IEC 13157-2 (ECMA-386).
dA 256 bits See Clause 6 of ISO/IEC 13157-2 (ECMA-386).
dB 256 bits See Clause 6 of ISO/IEC 13157-2 (ECMA-38
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...