It does not describe these algorithms. It does not cover the internal implementation within the card or the outside world. It gives the identifier, name, description, format, coding and layout of each DE and defines the means of retrieval of DEs from the card. Annexes are provided that give examples of operations related to digital signatures, certificates and the import and export of asymmetric keys.

Author:Daill Maurg
Language:English (Spanish)
Published (Last):20 January 2012
PDF File Size:4.37 Mb
ePub File Size:14.68 Mb
Price:Free* [*Free Regsitration Required]

Migal Identification of persons using biometric methods is outside the scope of this standard. Each data field shall have one of the following three structures. The file reference denotes the file where the key reference is valid. This mechanism may be used for protecting the right of filettype user. The logical organization of data in a foletype consists of following structural hierachy of dedicated files:. The result of an authentication may be logged in an internal EF according to the requirements of the application.

This clause contains information on the logical structure of data as seen at the interface, when processing interindustry commands for interchange. The security items algorithms, key and initial data used for processing the data field of a command message may be different from those used isp producing the data field of the subsequent response messsage. Easy chip card integration with our smart card. Size of the records: Those data objects shall integrate data block by data block in the current check block.

It encodes an integer L. Linear file with records of variable size. An algorithm, a key and, possibly initial data may be selected for each security mechanism implicitly, i. This mechanism may be used to provide a confidentiality service, e. This part specifies the power, signal structures, and the structure for the answer to reset between an integrated circuit card s with synchronous transmission and an interface device such as a terminal.

Referencing by record number shall not affect the record pointer. This part specifies commands for application management in a multi-application environment.

ISO part 4, section. NOTES An EF of record structure may support data unit referencing and in case it does, data units may contain structural information along with data, e. If a card supports the logical channel mechanism, then the maximum number of available logical channels is indicated in the card capabilities see 8.

The parameter bytes P1-P2 of a command may have any value. It is an unsigned integer, limited to either 8 or 15 bits according to an option in the respective command.

No byte is used for Le valued filteype 0. This clause describes the following features: The basic logical channel is permanently available. Referencing by file identifier — Any file may be referenced by a file identifier coded on 2 bytes. For example, the last possible position of a template for cryptographic checksum is just before the first data object integrated in the computation.

ISO part 4 section 5 APDU level data structures Data encipherment — Using secret internal data, the card deciphers a cryptogram received in a data field. The digital signature computation is typically based upon asymmetric cryptographic techniques. Empty data objects shall list all data needed for producing the response.

Retrieved 19 April According to its abstract, it specifies the Data Elements DEs used for interindustry interchange based on integrated circuit cards ICCs both with contacts and without contacts.

Within each EF of linear structure, the logical positions shall be sequentially assigned when writing or appending i. Data may be referenced as records, as data units or as data objects. If L in not viletype, then the value field V consists of consecutive bytes. Between those two identifiers, the path consists of the identifiers of the successive parent DFs if any.

The following structures of EFs are defined: The splitting into data iev shall be performed in the following way. This mechanism may be used for protecting the rights of a provider.

The algorithm under control of the related key basically transforms a current input block of k bytes typically 8 or 16 into a current output block of the same length. Figure 1 illustrates an example of the logical file organization in a card. The use of a block cipher may involve padding.

Related Posts


ISO/IEC 7816-15:2016





Related Articles