ISO 7816-5 PDF
STANDARD. ISO/IEC. Second edition. Identification cards — Integrated circuit cards —. Part 5: Registration of application providers. ISO is one of most important standards in the smart card industry. Parts of ISO specify physical characteristics, dimensions and location of the. ISO , Section 5 contains basic organizations, data structures, file organization, file referencing methods, data referencing methods, record referencing.
|Published (Last):||4 May 2011|
|PDF File Size:||6.17 Mb|
|ePub File Size:||6.4 Mb|
|Price:||Free* [*Free Regsitration Required]|
Cards with contacts — Physical characteristics”. When a file cannot be implicitly selected, it shall be possible to select it by at least one of the following methods: The following additional rules are defined for linear structures and for cyclic structures: This mechanism may be used to provide a confidentiality service, e.
The tag field T consists of one or more consecutive bytes. 77816-5 following structures of EFs are defined: By the relevant security mechanisms, with the selected security items, the card shall produce all the requested security mechanism data objects. According to its abstract, it specifies the operating conditions of an integrated circuit card that provides a USB interface. File-specific security status — It may be modified by the completion of a DF-related authentication procedure e.
The previous occurrence shall be equvalent to the last occurrence. Retrieved 19 April The following rules shall apply The card shall fill each empty primitive data object Each control reference template present in the response descriptor shall be present in the response at the same place with iao same control references for algorithm, file and key. Within each EF of cyclic structure, the logical positions shall be sequentially assigned in the opposite order, i. The length of Le is not null; therefore the Le field is present.
Created inamended in,updated in In order to select unambiguously any file by its identifier, all EFs and DFs immediately under a given DF shall have different file identifiers.
ISO part 4 section 5 APDU level data structures
For the computation of a cryptogram not preceded by a padding indicator byte, the default mechanism is a stream cipher with exclusive-or of the string of data bytes to be concealed with a concealing string of the same length. In the data field, the present SM format may be selected implicitly, i. NOTES An EF of record structure may support data unit referencing and in case it does, data units may contain structural information along with data, e.
In order to select unambiguously by DF name e.
The computation of a digital signature related data objects. This mechanism may be used for protecting the rights of a provider. Transparent structure — Isi EF is seen at the interface as a sequence of data units.
You may experience issues viewing this site in Internet Explorer 9, 10 or Consequently, the body consists of the Le field. The security attributes, when they exist, define the allowed actions and the procedures to be performed to complete such actions. Figure 1 illustrates an example of the logical file organization in a card. The length Le is also not null; therefore the Le field is also present. Reference to a record or to a data unit outside an EF is an error.
This clause describes the following features: There are two types of digital signatures: These commands cover the entire life cycle of the card and therefore some commands may be used before the card has been issued to the cardholder or after the card has expired. The first 4 cases apply to all cards. Each data object as defined in 1. ISO standards by standard number.
The previous occurrence shall be the closest record with the specified identifier but in a smaller logical position than the current record. This specification does not preclude the determination by sequential analysis of which mechanisms and which security items shall be used for processing the remaining part of the data field. Created inupdated inamended inupdated in The length Le is also null; therefore the Le field is empty. Padding for authentication has no influence on transmission as the padding bytes shall not be transmitted.
Data referencing method, record numbering method and data unit size are EF-dependent features.
In other projects Wikimedia Commons. The first byte of the value field is named the type cryptogram descriptor byte and is mandatory. Size of the records: For example, the last possible position of a template for cryptographic checksum is just before the first data object integrated in the computation. Decoding conventions for Le If the value of Le is coded in 1 or 2 byte s where the bits are not all null, then the value of Le is equal to the value of the byte s which lies in the range from 1 to or ; the null value of all the bits means the maximum value of Le: The MF is mandatory.
Data objects for confidentiality are intended for carrying a cryptogram which plain value consists of one of the following 3 cases: The card shall support at least one isk the following four methods for structuring EFs: This mechanism may iiso used for protecting privacy and for reducing the possibilities of message filtering.
The file reference denotes the file where the key reference is valid. This clause contains information on the logical structure of data as seen at the interface, when processing interindustry commands for interchange. It is an unsigned 7816–5, limited to either 8 or 15 bits according to an option in the respective command.