Implementing Electronic Card Payment Systems (Artech House Computer Security Series)

5.6 Issuing EMV ¢ public key certificates

The EMV ¢ public key certificates are issued with a digital signature scheme giving message recovery based on the RSA algorithm. This scheme is described in Appendix F, Section F.3.1 (case 2) of this book. Therefore, in this section we refer to the notations introduced in the aforementioned appendix.

5.6.1 Data items included in the certificate

Let us denote with M = M R M ² the entity public key data to be signed by the certifier. The length of this data is L , and the byte-length of the certifier public key ( modulus ) is N . The entity can be the issuer (if the certifier is the CA) or the entity can be the ICC or the ICC PIN encipherment (if the certifier is the issuer).

Then the part M R of the message M that is recoverable from the entity public key certificate consists of N ˆ’ 22 bytes, containing the following data items (which summarizes the content of Tables 1, 6, 7, and 19 in Book 2 [1]):

The part M ² of the message M (entity public key data) that has to be separately transmitted for certificate verification has variable length, containing the following data items (which summarizes the content of Tables 1, 6, 7, and 19 in Book 2 [1]):

5.6.2 Generating the public key certificate

In order to generate the Issuer Public Key Certificate, the CA applies the algorithm described in Appendix F, Section F.3.1 (case 2), on the issuer public key data (as described in Section 5.6.1 where the entity is the issuer) with the following RSA parameters: n S = n CA and d S = d CA .

In order to obtain the ICC Public Key Certificate, of length N I , the issuer applies the algorithm described in Appendix F, Section F.3.1 (case 2), on the ICC public key data (as described in Section 5.6.1 where the entity is the ICC) with the following RSA parameters: n S = n I and d S = d I . The issuer generates the ICC Public Key Certificate for each card that supports off-line DDA (Section 6.4.3). This certificate is loaded in the card during its personalization stage.

In order to obtain the ICC PIN Encipherment Public Key Certificate, of length N I , the issuer applies the algorithm described in Appendix F, Section F.3.1 (case 2), on the ICC PIN encipherment public key data (as described in Section 5.6.1 where the entity is the ICC PIN encipherment). The issuer uses the following RSA parameters: n S = n I and d S = d I . The issuer generates the ICC PIN Encipherment Public Key Certificate for each card that supports enciphered PIN verification by the card (Section 6.6.5). This certificate is loaded in the card during its personalization stage.

Категории