ISO 7816-5 PDF

STANDARD. ISO/IEC. Second edition. Identification cards — Integrated circuit cards —. Part 5: Registration of application providers. ISO is one of most important standards in the smart card industry. Parts of ISO specify physical characteristics, dimensions and location of the. ISO , Section 5 contains basic organizations, data structures, file organization, file referencing methods, data referencing methods, record referencing.

Author: Zolojora Dair
Country: Greece
Language: English (Spanish)
Genre: Medical
Published (Last): 15 December 2015
Pages: 453
PDF File Size: 14.69 Mb
ePub File Size: 11.67 Mb
ISBN: 719-5-57639-131-6
Downloads: 81997
Price: Free* [*Free Regsitration Required]
Uploader: Fezshura

However, logical channels may share application-dependent security status and therefore may have security-related command interdependencies across logical channels e.

Logical channels are numbered from 0 to 3. You may experience issues viewing this site in Internet Explorer 9, 10 or Annexes are provided that give examples of operations related to digital signatures, certificates and the import and export of asymmetric keys. The algorithm under control of the related key basically transforms a current input block of k bytes typically 8 or 16 into a current output block 7186-5 the same length.

The first output results from the first input. After closing the logical channel number will be available for re-use. If the concept of logical channels is applied, the file specify security status may depend on the logical channel see 1. The key reference identifies the key to be used.

Data authentication — Using internal data, either secret or public, the card checks redundant data recived from the outside world. Enregistrement des fournisseurs d’application Title in German Identifikationskarten.

This application contains information on cryptographic functionality. When numbered, its number is 0. This mechanism may be used for protecting privacy and for reducing the possibilities of message filtering. Each data field isk have one of the following three structures. Therefore the first created record is in the first logical position. The parameter bytes Iao of a command may have any value. Consequently, the body is empty. Short EF identifiers connot be used in a path or as a file identifier e.


ISO/IEC – Wikipedia

Each control reference remains valid until a new control reference is provided for the same mechanism. If L is null, then the data object is empty: An algorithm, a key and, possibly initial data may be selected for each security mechanism implicitly, i. ISO standards by standard number.

The first output results from the first data block. If an empty reference data object for auxiliary data is present in the response descriptor, then it shall be full in the response. Command-specific status — It only exists during the execution of a command involving authentication using secure messaging see 1. The following attributes are defined for EFs structured in records: Inside the response descriptor, the security mechanisms are not yet applied: Created inupdated inamended in In case 1, the length Lc is null; therefore the Lc field and the data field are empty.

Commands for card management”. The use of a block cipher may involve padding. It codes no class and no construction-type. If no initial data reference is present and no initial check block is implicitly selected, then the null block shall be used.

For example, the last possible position of a template for cryptographic checksum is just before the first data object integrated in the computation.

The following additional rule is defined for linear structures and for cyclic structures: Data is considered to be stored in a single continuous sequence of records within an EF of record structure or of data units within an EF of transparent structure. Data objects for confidentiality are intended for carrying a cryptogram which plain value consists of one of the following 3 cases: The FCI template is intended for conveying file control parameters and file management data.


Sio L in not null, then the value field V consists of consecutive bytes.

This page was last edited on 19 Aprilat Search all products by. In order to select unambiguously any file by its identifier, all EFs and DFs immediately under a 7816-55 DF shall have different file identifiers.

In the data field, the present SM format may be selected implicitly, i.

ISO/IEC 7816

When the Le field contains only zeros, the maximum number of available data bytes is requested. Transparent structure — The EF is seen at the interface as a sequence of data units. It encodes a class, a type and a number.

Views Read Edit View history. Therefore a spcecific response corresponds to a specific command, referred to as a command-response pair. The splitting into data blocks shall be performed in the following way. The tag field T consists of a single byte encoding only a number from 1 to e. The loaded data may contain, for example, code, keys and applets.

According to its abstract, it specifies interindustry commands for integrated circuit cards both with contacts and without contacts for card and file management, e.