Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services

Part 1 of this series specifies the application interface to Smart Cards during the usage phase, used as Secure Signature Creation Devices (SSCD) according to the Terms of the European Directive on Electronic Signature 1999/93 to enable interoperability and usage as SSCD on a national or European level.
This document describes the mandatory services for the usage of Smart Cards as SSCDs based on CEN CWA 14890. This covers the signing function, storage of certificates, the related user verification, establishment and use of trusted path and channel, requirements for key generation and the allocation and format of resources required for the execution of those functions and related cryptographic token information.
Thereby the functionality of CWA 14890-1 is enhanced in the following areas:-
-   Device authentication with Elliptic Curves (ELC) for existing asymmetric authentication protocols (RSA Transport, Privacy Protocol),
-   Enhancement of existing asymmetric authentication protocols due to privacy and non-traceability constraints,
-   Card Verifiable (CV) Certificate Formats (self descriptive) with ELC for all types of authentication and authorization protocols,
-   Secure Messaging Tags and use of commands with Odd-INS Code in compliance to the actual ISO/IEC 7816-4,
-   Further hash algorithms (SHA2–family) with corresponding Object identifier and Algorithm references,
-   Use of AES in authentication protocols.
-   Use of AES for secure messaging
The following items are out of scope:
1.   The physical, electrical and transport protocol characteristics of the card,
2.   The external signature creation process and signature environment,
3.   The elements required to verify an electronic signature produced by a card used as a SCCD,
4.   The error handling process.

Anwendungsschnittstelle für Chipkarten, die zur Erzeugung gesicherter Signaturen verwendet werden — Teil 1: Basis-Anforderungen

Teil 1 dieser Reihe legt die Anwendungsschnittstelle für Chipkarten während ihrer Verwendung zur Erzeugung
gesicherter Signaturen entsprechend den Bedingungen der Europäischen Richtlinie 1999/93 über
elektronische Signaturen zur Ermöglichung der Interoperabilität und Verwendung als sichere
Signaturerstellungseinheiten (Secure Signature Creation Devices, SSCD) auf nationaler oder europäischer
Ebene fest.
Dieses Dokument beschreibt die obligatorischen Dienste für die Verwendung von Chipkarten als SSCD auf
der Grundlage von CEN CWA 14890 (alle Teile). Dazu gehören die Signierfunktion, das Speichern von
Zertifikaten, die entsprechende Benutzerüberprüfung, die Einrichtung und Verwendung vertrauenswürdiger
Pfade und Kanäle, Anforderungen an die Schlüsselerzeugung sowie die Zuteilung und das Format von
Betriebsmitteln, die zur Ausführung dieser Funktionen erforderlich sind sowie entsprechende
kryptographische Tokeninformationen.
Somit wird die Funktionalität von CWA 14890-1 in den folgenden Bereichen verbessert:
- Geräteauthentisierung mit elliptischen Kurven (Elliptic Curves, ELC) für bestehende asymmetrische
Authentisierungsprotokolle (RSA Transport, Privacy Protocol);
- Verbesserung bestehender asymmetrischer Authentisierungsprotokolle aufgrund von Einschränkungen
im Hinblick auf den Schutz personenbezogener Daten (Privacy) und Nichtbeweisbarkeit
(Non-Traceability);
- kartenverifizierbare (Card Verifiable, CV) Zertifikatformate (selbstbeschreibend) mit ELC für alle Arten von
Authentisierungs- und Berechtigungsprotokollen;
- Tags für Secure Messaging (sichere Nachrichtenübermittlung) und Verwendung von Befehlen mit
Odd-INS-Code entsprechend ISO/IEC 7816-4;
- weitere Hash-Algorithmen (SHA2-Familie) mit entsprechendem Objektbezeichner und Algorithmenreferenzen;
- Verwendung von AES in Authentisierungsprotokollen;
- Verwendung von AES für Secure Messaging.

Interfaces applicatives des cartes à puce utilisées pour le création de signatures électroniques sécurisées - Partie 1: Services de base

La partie 1 de la présente série de normes spécifie l’interface applicative, pendant la phase d’utilisation, des cartes à puces utilisées comme dispositifs de création de signature sécurisés (SSCD), selon les termes de la Directive européenne 1999/93 relative aux signatures électroniques, cette interface applicative devant permettre l’interopérabilité des cartes et leur utilisation comme SSCD à un échelon national ou européen.
Le présent document décrit les services obligatoires pour l’utilisation de cartes à puce comme SSCD sur la base du CWA CEN 14890. Il couvre la fonction de signature, l’archivage de certificats, la vérification d’utilisateur associée, l’établissement et l’utilisation d’un canal et d’un chemin sécurisés, les exigences relatives à la génération de clés. Il traite également de l’allocation et du format des ressources requises pour l’exécution de ces fonctions, ainsi que des informations sur le dispositif cryptographique associé.
À ce titre, la fonctionnalité du CWA 14890-1 est améliorée dans les domaines suivants :
   l’authentification des dispositifs au moyen de courbes elliptiques (ELC) dans le cadre des protocoles d’authentification asymétrique existants (transport RSA, protocole relatif à la protection de la vie privée) ;
   l’amélioration des protocoles d’authentification asymétrique existants en fonction des contraintes de non-traçabilité et de protection de la vie privée ;
   les formats de certificats (explicites) vérifiables par la carte (CV) au moyen des ELC, pour tous les types de protocoles d’authentification et d’autorisation ;
   les étiquettes de messagerie de sécurité et l’utilisation de commandes avec un code Odd-INS, en conformité avec la norme ISO/IEC 7816-4 effective ;
   les algorithmes de hachage supplémentaires (famille SHA2) avec l’identifiant d’objet et les références d’algorithmes correspondants ;
   l’utilisation d’AES dans les protocoles d’authentification ;
   l’utilisation d’AES pour la messagerie de sécurité.

Uporabniški vmesnik za pametne kartice, ki se uporabljajo kot naprave za izdelovanje varnega podpisa - 1. del: Osnovne storitve

General Information

Status
Withdrawn
Publication Date
04-Mar-2009
Withdrawal Date
03-Feb-2015
Technical Committee
Current Stage
9900 - Withdrawal (Adopted Project)
Start Date
16-Jan-2015
Due Date
08-Feb-2015
Completion Date
04-Feb-2015

Relations

Buy Standard

Standard
EN 14890-1:2009
English language
195 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.Uporabniški vmesnik za pametne kartice, ki se uporabljajo kot naprave za izdelovanje varnega podpisa - 1. del: Osnovne storitveAnwendungsschnittstelle für Chipkarten, die zur Erzeugung gesicherter Signaturen verwendet werden — Teil 1: Basis-AnforderungenInterfaces applicatives des cartes à puce utilisées pour le création de signatures électroniques sécurisées - Partie 1: Services de baseApplication Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services35.240.15Identifikacijske kartice in sorodne napraveIdentification cards and related devicesICS:Ta slovenski standard je istoveten z:EN 14890-1:2008SIST EN 14890-1:2009en,de01-april-2009SIST EN 14890-1:2009SLOVENSKI
STANDARD



SIST EN 14890-1:2009



EUROPEAN STANDARDNORME EUROPÉENNEEUROPÄISCHE NORMEN 14890-1December 2008ICS 35.240.15Supersedes CWA 14890-1:2004
English VersionApplication Interface for smart cards used as Secure SignatureCreation Devices - Part 1: Basic servicesInterface applicative des cartes à puces utilisées commedispositifs de création de signature numérique sécurisés -Partie 1 : Services de basesAnwendungsschnittstelle für Chipkarten, die zur Erzeugungqualifizierter elektronischer Signaturen verwendet werden -Teil 1: Allgemeine DiensteThis European Standard was approved by CEN on 27 September 2008.CEN members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for giving this EuropeanStandard the status of a national standard without any alteration. Up-to-date lists and bibliographical references concerning such nationalstandards may be obtained on application to the CEN Management Centre or to any CEN member.This European Standard exists in three official versions (English, French, German). A version in any other language made by translationunder the responsibility of a CEN member into its own language and notified to the CEN Management Centre has the same status as theofficial versions.CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Cyprus, Czech Republic, Denmark, Estonia, Finland,France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal,Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland and United Kingdom.EUROPEAN COMMITTEE FOR STANDARDIZATIONCOMITÉ EUROPÉEN DE NORMALISATIONEUROPÄISCHES KOMITEE FÜR NORMUNGManagement Centre: rue de Stassart, 36
B-1050 Brussels© 2008 CENAll rights of exploitation in any form and by any means reservedworldwide for CEN national Members.Ref. No. EN 14890-1:2008: ESIST EN 14890-1:2009



EN 14890-1:2008 (E) 2 Contents Foreword.6 1 Scope.7 2 Normative references.8 3 Terms and definitions.8 4 Symbols and abbreviations.11 5 Signature application.13 5.1 Application Flow.13 5.2 Trusted environment versus untrusted environment.16 5.3 Selection of ESIGN application.16 5.3.1 General.16 5.3.2 Exceptions for Secure Messaging.17 5.4 Selection of cryptographic information application.17 5.5 Concurrent usage of signature applications.17 5.5.1 General.17 5.5.2 Methods of channel selection.17 5.5.3 Security issues on multiple channels.17 5.6 Security environment selection.18 5.7 Key selection.18 5.8 Basic Security Services.18 6 User verification.19 6.1 General.19 6.2 Knowledge based user verification.19 6.2.1 General.19 6.2.2 Explicit user verification.20 6.2.3 Password related mechanisms.20 6.2.4 Presentation formats.21 6.2.5 Retry counters.21 6.2.6 Password Change.21 6.2.7 Reset of RC and setting a new password.22 6.3 Biometric user verification.23 6.3.1 General.23 6.3.2 Retrieval of the Biometric Information Template.24 6.3.3 Performing the biometric user verification.25 6.3.4 Reset of RC.27 7 Digital Signature Service.28 7.1 Signature generation algorithms.28 7.2 Activation of digital signature service.28 7.3 General aspects.29 7.4 Signature Generation.30 7.4.1 No hashing in Card.30 7.4.2 Partial hashing.31 7.4.3 All hashing in Card.32 7.5 Selection of different keys, algorithms and input formats.33 7.5.1 Restore an existing SE.34 7.5.2 Modify the HT of a current SE.34 7.5.3 Modify the DST of a current SE.35 7.6 Read certificates and certificate related information.36 7.6.1 Read certificate related CIOs.36 7.6.2 Read signer’s certificate from ICC.36 7.6.3 Retrieval of the signer’s certificate from a directory service.37 SIST EN 14890-1:2009



EN 14890-1:2008 (E) 3 8 Device authentication.38 8.1 Certification authorities and certificates.38 8.1.1 Certificate chains.38 8.1.2 Usage of cross certificates.39 8.2 Authentication environments.40 8.2.1 SCA in trusted environment.40 8.2.2 SCA in untrusted environment.41 8.2.3 Specification of the environment.41 8.2.4 Display message mechanism.41 8.2.5 Additional authentication environments.41 8.3 Key transport and key agreement mechanisms.41 8.4 Key transport protocol based on RSA.42 8.4.1 Authentication Steps.43 8.4.2 Session Key creation.52 8.5 Device authentication with privacy protection.52 8.5.1 Authentication steps.53 8.6 Privacy constrained Modular EAC (mEAC) protocol with non-traceability feature (based on elliptic curves).70 8.6.1 Example for traceability case.70 8.6.2 Notation.70 8.6.3 Authentication steps.71 8.7 Asymmetric Authentication summary.82 8.8 Symmetric authentication scheme.83 8.8.1 Authentication steps.83 8.8.2 Session Key creation.86 8.9 Compute Session keys from key seed KIFD/ICC.87 8.9.1 Compute TDES session keys.87 8.9.2 Compute AES-128 session keys for CBC mode and EMAC.88 8.9.3 Compute AES-128 session keys for CBC mode and CMAC.88 8.10 Compute send sequence counter SSC.89 8.11 Post-authentication phase.89 8.12 Ending the secure session.89 8.12.1 Example for ending a secure session.89 8.12.2 Rules for ending a secure session.89 8.13 Reading the Display Message.90 8.14 Updating the Display Message.92 9 Secure messaging.93 9.1 CLA byte.93 9.2 TLV coding of command and response message.93 9.3 Treatment of SM-Errors.94 9.4 Padding for checksum calculation.94 9.5 Send sequence counter (SSC).94 9.6 Message structure of Secure Messaging APDUs.95 9.6.1 Cryptograms.95 9.6.2 Cryptographic Checksums.97 9.6.3 Final command APDU construction.100 9.7 Response APDU protection.101 9.8 Use of TDES and AES.107 9.8.1 TDES/AES encryption/decryption.107 9.8.2 CBC mode.108 9.8.3 Retail MAC with TDES.108 9.8.4 EMAC with AES.109 9.8.5 CMAC with AES.110 10 Key Generation.111 10.1 Key generation and export using PrK.ICC.AUT.111 10.2 Key generation and export with dynamic or static SM.111 10.3 Write certificates.112 10.4 Setting keys in static secure messaging.112 11 Key identifiers and parameters.112 SIST EN 14890-1:2009



EN 14890-1:2008 (E) 4 11.1 Key identifiers (KID).112 11.2 Public Key parameters.112 11.3 DSA with ELC public key parameters.113 11.4 RSA Diffie-Hellman key exchange parameters.114 11.5 ELC key exchange parameters.114 12 Data structures.115 12.1 CRTs.115 12.1.1 CRT AT for selection of internal authentication keys.115 12.1.2 CRT for selection of IFD’s PuK.CAIFD.CS_AUT.115 12.1.3 CRT for selection of IFD’s PuK.IFD.AUT.116 12.1.4 CRT AT for selection of the public DH key parameters.116 12.1.5 GENERAL AUTHENTICATE DH key parameters.116 12.1.6 CRT AT for selection of ICC’s private authentication key.116 12.1.7 CRT for selection of IFD’s PuK.IFD.AUT.117 12.1.8 CRT for selection of PrK.ICC.KA.117 12.2 Key transport device authentication protocol.117 12.2.1 EXTERNAL AUTHENTICATE.117 12.2.2 INTERNAL AUTHENTICATE.118 12.3 Privacy device authentication protocol.119 12.3.1 EXTERNAL AUTHENTICATE.119 12.3.2 INTERNAL AUTHENTICATE.120 13 AlgIDs, Hash- and DSI Formats.121 13.1 Algorithm Identifiers and OIDs.121 13.2 Hash Input-Formats.122 13.2.1 PSO:HASH without command chaining.123 13.2.2 PSO:HASH with command Chaining.124 13.3 Formats of the Digital Signature Input (DSI).124 13.3.1 DSI according to ISO/IEC 14888-2 (scheme 2).124 13.3.2 DSI according to PKCS #1 V 1.5.125 13.3.3 Digest Info for SHA-X.127 13.3.4 DSI according to PKCS #1 V 2.x.128 13.3.5 DSA with DH key parameters.130 13.3.6 Elliptic Curve Digital Signature Algorithm - ECDSA.130 14 CV_Certificates and Key Management.130 14.1 Level of trust in a certificate.130 14.2 Key Management.130 14.3 Card Verifiable Certificates.131 14.3.1 Signature-Certificates.132 14.3.2 Authentication Certificates.132 14.4 Use of the public key extracted from the certificate.132 14.5 Validity of the key extracted from a certificate.132 14.6 Structure of CVC.133 14.6.1 Non-self-descriptive certificates.133 14.6.2 Self-descriptive certificates.134 14.7 Certificate Content.134 14.7.1 CPI-Certificate Profile Identifier.135 14.7.2 CAR-Certification Authority Reference.136 14.7.3 CHR-Certificate Holder Reference.137 14.7.4 CHA-Certificate Holder Authorization (CHA).138 14.7.5 Role identifier specifications.139 14.7.6 CHAT-Certificate Holder Authorization Template (CHAT).142 14.7.7 OID — Object identifier.142 14.7.8 CED — Certificate Effective Date.144 14.7.9 CXD — Certificate Expiration date.144 14.8 Certificate signature.144 14.8.1 Non self-descriptive certificates.144 14.8.2 Self descriptive certificates.146 14.9 Coding of the certificate content.146 14.9.1 Non self-descriptive certificates.146 SIST EN 14890-1:2009



EN 14890-1:2008 (E) 5 14.9.2 Self-descriptive certificates.147 14.9.3 Self-descriptive certificates for elliptic curve cryptography.147 14.10 Steps of CVC verification.150 14.10.1 First round: CVC verification from a Root PuK.151 14.10.2 Subsequent round(s).152 14.11 Commands to handle the CVC.152 14.12 C_CV.IFD.AUT (non self-descriptive).152 14.13 C_CV.CA.CS-AUT (non self-descriptive).154 14.14 C.ICC.AUT.155 14.15 Self-descriptive CV Certificate (Example).155 14.15.1 Public Key.156 15 Files.157 15.1 File structure.157 15.2 File IDs.158 15.3 EF.DIR.158 15.4 EF.SN.ICC.158 15.5 EF.DH.159 15.6 EF.ELC.159 15.7 EF.C.ICC.AUT.160 15.8 EF.C.CAICC.CS-AUT.
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.