{"id":344176,"date":"2024-10-20T00:10:07","date_gmt":"2024-10-20T00:10:07","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-15-30327568-dc\/"},"modified":"2024-10-25T23:31:15","modified_gmt":"2024-10-25T23:31:15","slug":"bsi-15-30327568-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-15-30327568-dc\/","title":{"rendered":"BSI 15\/30327568 DC"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
10<\/td>\n1 Scope
2 Conformance
3 Normative references <\/td>\n<\/tr>\n
11<\/td>\n4 Terms and definitions
5 Conventions and notations <\/td>\n<\/tr>\n
12<\/td>\n6 Acronyms
7 General <\/td>\n<\/tr>\n
13<\/td>\n8 Fields and PDUs for NEAU-S
8.1 Protocol Identifier (PID)
8.2 NFC-SEC-PDUs
8.3 Entity identifiers <\/td>\n<\/tr>\n
14<\/td>\n9 Primitives
9.1 General requirements <\/td>\n<\/tr>\n
15<\/td>\n9.2 Entity authentication
9.2.1 Mechanism
9.2.2 AES
9.2.3 Modes of operation
9.2.4 Message Authentication Code (MAC)
9.3 Key agreement
9.4 Key confirmation
9.4.1 Overview
9.4.2 Key confirmation tag generation
9.4.3 Key confirmation tag verification <\/td>\n<\/tr>\n
16<\/td>\n9.5 Key Derivation Function (KDF)
9.5.1 Overview
9.5.2 KDF for MKA and KEIA
9.5.3 KDF for the shared secret Z
9.5.4 KDF for the SSE and SCH <\/td>\n<\/tr>\n
17<\/td>\n9.6 Data authenticated encryption during authentication
9.6.1 Initial values (IV)
9.6.2 Additional Authenticated Data (AAD)
9.6.3 NEAU-S payload encryption and MAC generation
9.6.4 NEAU-S payload decryption and MAC verification <\/td>\n<\/tr>\n
18<\/td>\n10 NEAU-S mechanism
10.1 Protocol overview
10.2 Preparation
10.3 Sender (A) transformation <\/td>\n<\/tr>\n
19<\/td>\n10.4 Recipient (B) transformation <\/td>\n<\/tr>\n
20<\/td>\n11 Data Authenticated Encryption in SCH <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS ISO\/IEC 13157-5. Information technology. Telecommunications and information exchange between systems. NFC Security. Part 5. NFC-SEC entity authentication and key agreement using symmetric cryptography<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2015<\/td>\n21<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":344178,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-344176","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/344176","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/344178"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=344176"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=344176"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=344176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}