ISO/IEC 7816 - 7816-8: Commands For Security Operations

7816-8: Commands For Security Operations

Created in 1995, updated in 2004.

According to its abstract, it specifies interindustry commands for integrated circuit cards (either with contacts or without contacts) that may be used for cryptographic operations. These commands are complementary to and based on the commands listed in ISO/IEC 7816-4.

Annexes are provided that give examples of operations related to digital signatures, certificates and the import and export of asymmetric keys.

The choice and conditions of use of cryptographic mechanisms may affect card exportability. The evaluation of the suitability of algorithms and protocols is outside the scope of ISO/IEC 7816-8.

Read more about this topic:  ISO/IEC 7816

Famous quotes containing the words commands, security and/or operations:

    They went to him and woke him up, shouting, “Master, Master, we are perishing!” And he woke up and rebuked the wind and the raging waves; they ceased, and there was a calm. He said to them, “Where is your faith?” They were afraid and amazed, and said to one another, “Who then is this, that he commands even the winds and the water, and they obey him?”
    Bible: New Testament, Luke 8:24-25.

    A well-regulated militia being necessary to the security of a free State, the right of the people to keep and bear arms shall not be infringed.
    U.S. Constitution, Second Amendment.

    A sociosphere of contact, control, persuasion and dissuasion, of exhibitions of inhibitions in massive or homeopathic doses...: this is obscenity. All structures turned inside out and exhibited, all operations rendered visible. In America this goes all the way from the bewildering network of aerial telephone and electric wires ... to the concrete multiplication of all the bodily functions in the home, the litany of ingredients on the tiniest can of food, the exhibition of income or IQ.
    Jean Baudrillard (b. 1929)