ISO , Section 5 contains basic organizations, data structures, file organization, file referencing methods, data referencing methods, This part of ISO/IEC supports the following two categories of files: . 0 — x x x — — —, File type. ISO/IEC is intended to be used in any sector of activity. It specifies: a ) contents of command-response pairs exchanged at the interface,. b) means of. ISO/IEC (): “Information technology – Identification cards; Integrated . The key reference is indicated using tag ’83’ as defined in ISO/IEC .
|Country:||Trinidad & Tobago|
|Published (Last):||2 October 2014|
|PDF File Size:||6.1 Mb|
|ePub File Size:||3.17 Mb|
|Price:||Free* [*Free Regsitration Required]|
Data may be referenced as records, as data units or as data objects. If present, the data objects of the other classes shall be integrated in such a computation.
Electronic signals and answer to reset for synchronous cards”. The last possible position of a control reference template is just before the first data object 78164 which the referred mechanism applies.
ISO part 4 section 5 APDU level data structures
Consequently, the body consists of the Le field. Cyclic EF with records of fixed size. This page was last edited on 19 Aprilat When there is a current record, the next occurrence shall be the closest record with the specified identifier but in a greater logical position than the current record. The present specifications of the padding rules do not preclude such a feature.
If the concept of logical channels is applied, the file specify security status may depend on the logical channel see 1. When padding is applied but not indicated the rules defined in 1. The digital signature computation is typically based upon asymmetric cryptographic techniques.
The first occurrence shall be the record with the specified identifier and in the first logical position; the last occurrence shall be the record with the specified identifier and in the last logical position. The basic logical channel shall not be closed. The file reference denotes the file where the key reference is valid.
The path allows an unambiguous selection af any file from the MF or from the current DF. The current output results from the current input. The previous occurrence shall be the closest record with the specified identifier but in a smaller logical position than the current record. Each time a reference is made with a record identifier, an indication shall specify the logical position of the target record the first or last occurrence, the next or previous occurrence relative to the record pointer: There are two types of digital signatures:.
In case 1, the body of the command APDU is empty.
An application protocol data unit APDU contains either a command message or a response message, sent from the interface device to the card or conversely. Transparent structure — The EF is seen at the interface as a sequence of data units. For example, the last possible position of a template for cryptographic checksum is just before the first data object integrated in the computation. Security attibutes may be associated with each file and fix the security conditions that shall be satisfied to allow operations on the file.
Padding for confidentiality has an influence on transmission, the cryptogram one or more blocks is longer than the plain text.
F I G U R E 2
Reference to a record or to a data unit outside an EF is an error. The tag field T consists of one or more consecutive bytes. If the response descriptor provides auxiliary data, then the respective data object shall be empty in the response. The cryptogram contents reference specifies the content of the cryptogram e.
ISO/IEC – Wikipedia
Each control reference remains valid until a new control reference is provided for the same mechanism. Retrieved 19 April If no file reference is present, then the key fileyype is valid in the current DF. In any command using secure messaging the following specific error conditions may occur: Therefore a spcecific response corresponds to a specific command, referred to as a command-response pair.