Customer Support: 131 242

  • Shopping Cart
    There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

EN 419212-3:2017

Current

Current

The latest, up-to-date edition.

Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 3: Device authentication protocols

Published date

20-09-2017

Sorry this product is not available in your region.

European foreword
Introduction
1 Scope
2 Normative references
3 Device authentication
4 Data structures
5 CV_Certificates and Key Management
Annex A (informative) - Device authentication Protocol Properties
Bibliography

This part specifies device authentication to be used for QSCDs in various context includingDevice authentication protocolsEstablishment of a secure channel Data structures CV-certificates Key managementThe device authentication protocols shall apply to sole-control signature mandated by the EU-regulation eIDAS.

Committee
CEN/TC 224
DevelopmentNote
Supersedes PREN 419212-3. (10/2017)
DocumentType
Standard
PublisherName
Comite Europeen de Normalisation
Status
Current

I.S. EN 419212-3:2017 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 3: DEVICE AUTHENTICATION PROTOCOLS
PREN 419212-3 : DRAFT 2016 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 3: DEVICE AUTHENTICATION PROTOCOLS
BS EN 419212-3:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Device authentication protocols
16/30348455 DC : 0 BS EN 419212-3 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 3: DEVICE AUTHENTICATION PROTOCOLS

ISO/IEC 7816-6:2016 Identification cards — Integrated circuit cards — Part 6: Interindustry data elements for interchange
ISO/IEC 11770-5:2011 Information technology Security techniques Key management Part 5: Group key management
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 7816-8:2016 Identification cards Integrated circuit cards Part 8: Commands and mechanisms for security operations
TS 119 312 : 1.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES
PREN 419111-1 : DRAFT 2013 PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - PART 1: INTRODUCTION
CEN/TS 15480-2:2012 Identification card systems - European Citizen Card - Part 2: Logical data structures and security services
ISO/IEC 7816-4:2013 Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange
PREN 419212-5 : DRAFT 2016 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 5: TRUSTED ESERVICE
ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
PREN 419111-2 : DRAFT 2013 PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - SIGNATURE CREATION APPLICATION - PART 2: CORE PP
EN 419212-1:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions
PREN 419212-4 : DRAFT 2016 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 4: PRIVACY SPECIFIC PROTOCOLS

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.