ISO/IEC is intended to be used in any sector of activity. It specifies: a ) contents of command-response pairs exchanged at the interface,. b) means of. ISO , Section 5 contains basic organizations, data structures, file organization, file referencing methods, data referencing methods, This part of ISO/IEC supports the following two categories of files: . 0 — x x x — — —, File type. ISO/IEC (): “Information technology – Identification cards; Integrated circuit(s) cards . and one or more SC bytes as defined in ISO/IEC [4].

Author: Dimuro Vudolabar
Country: Georgia
Language: English (Spanish)
Genre: Music
Published (Last): 21 November 2014
Pages: 373
PDF File Size: 8.51 Mb
ePub File Size: 18.23 Mb
ISBN: 566-4-16825-294-6
Downloads: 7405
Price: Free* [*Free Regsitration Required]
Uploader: Dodal

Moreover, before transmitting the first data object for confidentiality using a stream cipher, a template for confidentiality shall provide auxiliary data for initializing the computation of the string of concealing bytes.

The subsequent clauses specify coding conventions for the class byte, the instruction byte, the parameter bytes, the data field bytes and the status byte. It gives the identifier, name, description, format, coding and layout of each DE and defines the means of retrieval of DEs from the card. In order to select unambiguously any file by its identifier, all EFs and DFs immediately under a given DF shall have different file identifiers.

The file reference denotes the file where the key reference is valid. The blocking shall be continuous at the border between adjacent data objects to be integrated The padding shall apply at the end of each data object to be integrated followed either by a data object not to be integrated or by no further data object. The response descriptor template, if present in the data field of the command APDU, shall fix the structure of the corresponding response.

The basic logical channel is permanently available. In case 1, the body of the command APDU is empty.

F I G U R E 2

Command-response pairs work as currently described. This specification does not preclude the determination by sequential analysis of which mechanisms and which security items shall be used for processing the remaining part of filtype data field.


According to its abstract, it specifies interindustry commands for integrated circuit cards both with contacts and without contacts for card and file management, e.

The path allows an unambiguous selection af any file from the MF or from the current DF. Each data field shall have 7861 of the following three structures. Linear EF with record oso fixed size. Cards with contacts — Electrical interface and transmission protocols”. The length Le is also not null; therefore the Le field is also present. In case 1, the length Lc is null; therefore the Lc field and the data field are empty.

The first output results from the first data block. The security items algorithms, key and initial data used for processing the fipetype field of a command message may be different from those used for producing the data field of the subsequent response messsage.

This mechanism may be used for protecting the right of the fipetype. Each command message may carry a response descriptor template fixing the data objects required in response. When numbered, its number is 0. For cards indicating the extension of Lc and Le see 8. Linear file with records of variable size. Entity authentication with key — The entity to be euthenticated has to prove the knowledge of the relevant key in an authentication procedure e.

When there is a current record, the next occurrence shall be the closest record with the specified identifier but in a greater logical position than the current record. Each data object as defined in 1.

For the computation of a cryptogram not preceded by a padding indicator byte, the lec mechanism is a stream cipher with exclusive-or of the string of data bytes to be isl with a concealing string of the same length. The card shall support at least one of the following four methods for structuring EFs: The trailer codes the status of the receiving entity after processing the command-response pair.

The order of the file identifiers is always in the direction parent to child. If the response descriptor provides auxiliary data, then the respective data isl shall be empty in the response. Within each EF of cyclic structure, the logical positions shall be sequentially assigned in the opposite order, i. If L is not null, then the value field V consists of L consecutive bytes.


ISO/IEC – Wikipedia

Cards with contacts — Physical characteristics”. Personal verification fiiletype biometric methods”. Data objects for confidentiality are intended for carrying a cryptogram which plain value consists of one of the following 3 cases: When the Le field contains only zeros, the maximum number of available data bytes is requested.

The maximum number of bytes expected in the data field of the response APDU is denoted by Le length of expected filetypee. The following additional rule is defined for linear structures and for cyclic structures: The first input is the exclusive-or of the initial check block with the first data block.

Alternately, using secret internal data, the card computes a data element cryptographic checksum or digital signature and inserts it in the data sent to the outside world. Retrieved from ” https: Referencing by file identifier — Any file may be referenced by a file identifier coded on 2 bytes. The data fields of some other commands riletype.

The loaded data may contain, for example, code, keys and applets. Interindustry data elements for interchange”. The security status may also result from the completion of a security procedure related to the identification of the involved entities, if any, e.

A logical channel, as seen at the interface, works as a logical link to a DF. The algorithm under control of the related key basically transforms a current input block of k bytes typically 8 or 16 into a current output block of the same length.