Version 1: Release Note 28 November 2014



Download 4.8 Mb.
Page156/258
Date03.04.2021
Size4.8 Mb.
1   ...   152   153   154   155   156   157   158   159   ...   258
Value

Note

To calculate the Shared Secret (‘Z’) input to the KDF:

Private Key Agreement Key

Access Control Broker’s




Public Key Agreement Key

Device’s

As identified by the Business Target ID in Message Identifier

The other input to the KDF (‘OtherInfo’) shall be calculated according to the requirements of Section 4.3.3.3.










As input to the GMAC function, the IV shall be constructed according to the requirements of Section 4.3.3.4, the Plaintext shall be empty and:

Additional Authenticated Data shall be the concatenation:

0x11 || Grouping Header || @ProvideSecurityCredentialDetails.Command || 0x00




Table 13.2.4.2.1: Calculation of Access Control Broker MAC for Provide Security Credentials command

        1. Directory: government -> uploads -> system -> uploads -> attachment data -> file
          file -> Remove this if sending to pagerunnerr Page Title Light Rail Security Recommended Best Practice
          file -> 8 Section 1 : Sport
          file -> Notice of exercise of additional powers of seizure under Sections 50 or 51 of the Criminal Justice and Police Act 2001
          file -> Home office circular 004/2014 Powers to search for and seize invalid travel documents in Schedule 8 to the Anti-social Behaviour, Crime and Policing Act 2014
          file -> Consultation on the Royal Parks and Other Open Spaces (Amendment) (No. 2) Regulations 2012
          file -> Crown copyright 2012
          file -> This is the Report to Government by the Film Policy Review Panel The brief
          file -> Impact Assessment (IA)
          file -> Dcms/Wolfson Museums and Galleries Improvement Fund a public-Private Partnership (2002-2010)


          Share with your friends:
1   ...   152   153   154   155   156   157   158   159   ...   258




The database is protected by copyright ©essaydocs.org 2020
send message

    Main page