Already a subscriber? 

MADCAD.com Free Trial
Sign up for a 3 day free trial to explore the MADCAD.com interface, PLUS access the
2009 International Building Code to see how it all works.
If you like to setup a quick demo, let us know at support@madcad.com
or +1 800.798.9296 and we will be happy to schedule a webinar for you.
Security check
Please login to your personal account to use this feature.
Please login to your authorized staff account to use this feature.
Are you sure you want to empty the cart?
ISO/IEC 7816-15:2016 Identification cards - Integrated circuit cards - Part 15: Cryptographic information application, 2016
- 1 Scope
- 2 Normative references
- 3 Terms and definitions
- 4 Symbols and abbreviated terms [Go to Page]
- 4.1 Symbols
- 4.2 Abbreviated terms
- 5 Conventions
- 6 Cryptographic information objects [Go to Page]
- 6.1 General
- 6.2 CIO classes
- 6.3 Attributes
- 6.4 Access restrictions
- 7 CIO files [Go to Page]
- 7.1 Overview
- A CIO is contained in an elementary file, and refers, in general, to a CDE; a CIO may in some cases contain the CDE directly. A dedicated file (DF.CIA) contains CIO elementary files. Certain CIO files may be present under other dedicated files, in whi...
- 7.2 IC card requirements
- 7.3 Card file structure
- 7.4 EF.DIR
- 7.5 Contents of DF.CIA [Go to Page]
- 7.5.1 Overview
- 7.5.2 CIAInfo EF
- 7.5.3 EF.OD
- 7.5.4 CIO directory files
- 7.5.5 DF.CIA selection
- 8 Information syntax in ASN.1 [Go to Page]
- 8.1 Guidelines and encoding conventions
- 8.2 Basic ASN.1 defined types [Go to Page]
- 8.2.1 Identifier
- 8.2.2 Reference
- 8.2.3 Label
- 8.2.4 CredentialIdentifier
- 8.2.5 ReferencedValue and Path
- 8.2.6 ObjectValue
- 8.2.7 PathOrObjects
- 8.2.8 CommonObjectAttributes
- 8.2.9 CommonKeyAttributes
- 8.2.10 CommonPrivateKeyAttributes
- 8.2.11 CommonPublicKeyAttributes
- 8.2.12 CommonSecretKeyAttributes
- 8.2.13 GenericKeyAttributes
- 8.2.14 KeyInfo
- 8.2.15 CommonCertificateAttributes
- 8.2.16 GenericCertificateAttributes
- 8.2.17 CommonDataContainerObjectAttributes
- 8.2.18 CommonAuthenticationObjectAttributes
- 8.2.19 CIO type
- 8.3 CIOChoice type
- 8.4 Private key information objects [Go to Page]
- 8.4.1 PrivateKeyChoice
- 8.4.2 Private RSA key attributes
- 8.4.3 Private elliptic curve key attributes
- 8.4.4 Private Diffie-Hellman key attributes
- 8.4.5 Private DSA key attributes
- 8.4.6 Private KEA key attributes
- 8.4.7 Generic private key information objects
- 8.5 Public key information objects [Go to Page]
- 8.5.1 PublicKeyChoice
- 8.5.2 Public RSA key attributes
- 8.5.3 Public elliptic curve key attributes
- 8.5.4 Public Diffie-Hellman key attributes
- 8.5.5 Public DSA key attributes
- 8.5.6 Public KEA key attributes
- 8.5.7 Generic public key information objects
- 8.6 Secret key information objects [Go to Page]
- 8.6.1 SecretKeyChoice
- 8.6.2 Algorithm independent key attributes
- 8.6.3 GenericSecretKey type
- 8.7 Certificate information objects [Go to Page]
- 8.7.1 CertificateChoice
- 8.7.2 X.509 certificate attributes
- 8.7.3 X.509 attribute certificate attributes
- 8.7.4 SPKI certificate attributes
- 8.7.5 PGP (Pretty Good Privacy) certificate attributes
- 8.7.6 WTLS certificate attributes
- 8.7.7 ANSI X9.68 0F domain certificate attributes
- 8.7.8 Card verifiable certificate attributes
- 8.7.9 Generic certificate attributes
- 8.8 Data container information objects [Go to Page]
- 8.8.1 DataContainerObjectChoice
- 8.8.2 Opaque data container object attributes
- 8.8.3 ISO/IEC 7816 data object attributes
- 8.8.4 Data container information objects identified by OBJECT IDENTIFIERS
- 8.9 Authentication information objects [Go to Page]
- 8.9.1 AuthenticationObjectChoice
- 8.9.2 Password attributes [Go to Page]
- 8.9.2.1 General
- 8.9.2.2 Encoding a supplied password
- 8.9.3 Biometric reference data attributes
- 8.9.4 Authentication objects for external and internal authentication
- 8.10 Cryptographic information file, EF.CIAInfo
- Annex A (normative) ASN.1 module
- Annex B (informative) CIA example for cards with digital signature and authentication functionality [Go to Page]
- B.1 General
- B.2 CIOs
- B.3 Access control
- Annex C (informative) Example topologies
- Annex D (informative) Examples of CIO values and their encodings [Go to Page]
- D.1 General
- D.2 EF.OD [Go to Page]
- D.2.1 ASN.1 value notation
- D.2.2 ASN.1 description, tags, lengths and values
- D.2.3 Hexadecimal DER-encoding
- D.3 EF.CIAInfo [Go to Page]
- D.3.1 ASN.1 value notation
- D.3.2 ASN.1 description, tags, lengths and values
- D.3.3 Hexadecimal DER-encoding
- D.4 EF.PrKD [Go to Page]
- D.4.1 ASN.1 value notation
- D.4.2 ASN.1 description, tags, lengths and values
- D.4.3 Hexadecimal DER-encoding
- D.5 EF. CD [Go to Page]
- D.5.1 ASN.1 value notation
- D.5.2 ASN.1 description, tags, lengths and values
- D.5.3 Hexadecimal DER-encoding
- D.6 EF.AOD [Go to Page]
- D.6.1 ASN.1 value notation
- D.6.2 ASN.1 description, tags, lengths and values
- D.6.3 Hexadecimal DER-encoding
- D.7 EF.DCOD [Go to Page]
- D.7.1 ASN.1 value notation
- D.7.2 ASN.1 description, tags, lengths and values
- D.7.3 Hexadecimal DER-encoding of DCOD
- D.8 Application template (within the EF.DIR) [Go to Page]
- D.8.1 ASN.1 value notation
- D.8.2 ASN.1 description, tags, lengths and values in ApplicationTemplate
- D.8.3 Hexadecimal DER-encoding of ApplicationTemplate
- D.9 GeneralizedTime encoding guidelines
- Annex E (informative) Examples of the use of the cryptographic information application [Go to Page]
- E.1 General
- The purpose of this informative Annex is to provide practical examples of the use of the cryptographic information application. By providing sample program code for each example, programmers can see the programmatic connection between high-level ASN.1...
- Each clause in the Annex is a free-standing example and consists of four paragraphs. [Go to Page]
- E.2 Encoding of a private key [Go to Page]
- E.2.1 Cryptographic information application example description
- E.2.2 ASN.1 encoding of an RSA private key
- E.2.3 Code encoding and decoding from the ASN.1
- E.2.4 BER encoding
- E.3 Encoding of a protected data container [Go to Page]
- E.3.1 Cryptographic information application example description
- E.3.2 ASN.1 encoding of the protected data container object
- E.3.3 Code from the ASN.1 for encoding and decoding BER
- E.3.4 BER encoding
- E.4 Encoding of a certificate [Go to Page]
- E.4.1 Cryptographic information application example description
- E.4.2 ASN.1 Encoding of an X.509 certificate
- E.4.3 Code from the ASN.1 for encoding and decoding BER
- E.4.4 BER encoding
- E.5 Encoding of the ESIGN cryptographic information application [Go to Page]
- E.5.1 Cryptographic information application example description
- E.5.2 ASN.1 encoding of the IAS cryptographic information application
- E.5.3 Code from the ASN.1 for encoding a decoding BER
- E.5.4 BER encoding [Go to Page]