You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Nist 800-73-4 "3.1.1 SELECT Card Command" "Part 2"
"Table 5. Data Objects in a Cryptographic Algorithm Identifier Template (Tag 'AC')"
was really added for Secure messaging and would only have one. "Tag 0xAC shall be present and indicate algorithm identifier 0x27 or 0x2E (but not both)"
"Table 5. Data Objects in a Cryptographic Algorithm Identifier Template (Tag 'AC')"
says there is a '80' entry which if Secure Messaging would be 0x27 or 0x2E and a '06' entry value is set to 0x00
The version of ISO 7816-4-2013 I found: "9.2 Cryptographic mechanism identifier template" says: " One or more cryptographic mechanism identifier DO'AC' may be present ... Each one explicitly indicates the meaning of a cryptographic mechanism ... The template shall consist of two or more DOs."
"The first shall be a cryptographic mechanism reference, DO'80'"
"The second DO shall be an object identifier, DO'06', ..."
"If present, one or more subsequent DOs (DO'06' or DO'13') ... "
So if supported mechanisms are to be listed, each should have its own AC 06 80 01 xx 06 01 00 and could have the second 06 (ASN1 OID) Since there are issues with mapping Algorithm Identifiers for example E2 between Yubikey and Nitrokey an OID would say what is the intending algorithm.
NIST never required any AC for the required Algorithms, on till 800-74-4 to indicate SM was supported SM.
An Idemia test card which supports Secure Messaging responds with a single AC and compliant with both NIST and ISO
Using OpenSC. SELECT AID
Nist 800-73-4 "3.1.1 SELECT Card Command" "Part 2"
"Table 5. Data Objects in a Cryptographic Algorithm Identifier Template (Tag 'AC')"
was really added for Secure messaging and would only have one. "Tag 0xAC shall be present and indicate algorithm identifier 0x27 or 0x2E (but not both)"
"Table 5. Data Objects in a Cryptographic Algorithm Identifier Template (Tag 'AC')"
says there is a '80' entry which if Secure Messaging would be 0x27 or 0x2E and a '06' entry value is set to 0x00
The version of ISO 7816-4-2013 I found: "9.2 Cryptographic mechanism identifier template" says: " One or more cryptographic mechanism identifier DO'AC' may be present ... Each one explicitly indicates the meaning of a cryptographic mechanism ... The template shall consist of two or more DOs."
"The first shall be a cryptographic mechanism reference, DO'80'"
"The second DO shall be an object identifier, DO'06', ..."
"If present, one or more subsequent DOs (DO'06' or DO'13') ... "
So if supported mechanisms are to be listed, each should have its own
AC 06 80 01 xx 06 01 00
and could have the second 06 (ASN1 OID) Since there are issues with mapping Algorithm Identifiers for exampleE2
between Yubikey and Nitrokey an OID would say what is the intending algorithm.NIST never required any
AC
for the required Algorithms, on till 800-74-4 to indicate SM was supported SM.An Idemia test card which supports Secure Messaging responds with a single AC and compliant with both NIST and ISO
Note: OpenSC configured with "--enable-piv-sm" Supports the PIV Secure Messaging, which you could be helpful in testing SM on Nitrokey applet.
The text was updated successfully, but these errors were encountered: