Search Legislation

Council Regulation (EEC) No 3821/85Show full title

Council Regulation (EEC) No 3821/85 of 20 December 1985 on recording equipment in road transport

 Help about what version

What Version

  • Latest available (Revised)
  • Original (As adopted by EU)
 Help about advanced features

Advanced Features

Close

This is a legislation item that originated from the EU

After exit day there will be three versions of this legislation to consult for different purposes. The legislation.gov.uk version is the version that applies in the UK. The EU Version currently on EUR-lex is the version that currently applies in the EU i.e you may need this if you operate a business in the EU.

The web archive version is the official version of this legislation item as it stood on exit day before being published to legislation.gov.uk and any subsequent UK changes and effects applied. The web archive also captured associated case law and other language formats from EUR-Lex.

Changes to legislation:

There are currently no known outstanding effects for the Council Regulation (EEC) No 3821/85, Division 3. . Help about Changes to Legislation

Close

Changes to Legislation

Revised legislation carried on this site may not be fully up to date. At the current time any known changes or effects made by subsequent legislation have been applied to the text of the legislation you are viewing by the editorial team. Please see ‘Frequently Asked Questions’ for details regarding the timescales for which new effects are identified and recorded on this site.

[F1 [F23. KEYS AND CERTIFICATES U.K.

3.1. Keys generation and distribution U.K.
3.1.1. RSA keys generation and distribution U.K.

[CSM_006] RSA keys shall be generated through three functional hierarchical levels:

  • European level,

  • Member State level,

  • Equipment level.

[CSM_007] At European level, a single European key pair (EUR.SK and EUR.PK) shall be generated. The European private key shall be used to certify the Member States public keys. Records of all certified keys shall be kept. These tasks shall be handled by a European certification authority, under the authority and responsibility of the European Commission.

[CSM_008] At Member State level, a Member State key pair (MS.SK and MS.PK) shall be generated. Member States public keys shall be certified by the European Certification Authority. The Member State private key shall be used to certify public keys to be inserted in equipment (vehicle unit or tachograph card). Records of all certified public keys shall be kept with the identification of the equipment to which it is intended. These tasks shall be handled by a Member State certification authority. A Member State may regularly change its key pair.

[CSM_009] At equipment level, one single key pair (EQT.SK and EQT.PK) shall be generated and inserted in each equipment. Equipment public keys shall be certified by a Member State certification authority. These tasks may be handled by equipment manufacturers, equipment personalisers or Member State authorities. This key pair is used for authentication, digital signature and encipherement services

[CSM_010] Private keys confidentiality shall be maintained during generation, transport (if any) and storage.

The following picture summarises the data flow of this process:

3.1.2. RSA test keys U.K.

[CSM_011] For the purpose of equipment testing (including interoperability tests) the European certification authority shall generate a different single European test key pair and at least two Member State test key pairs, the public keys of which shall be certified with the European private test key. Manufacturers shall insert, in equipment undergoing type approval tests, test keys certified by one of these Member State test keys.

3.1.3. Motion sensor keys U.K.

The confidentiality of the three TDES keys described below shall be appropriately maintained during generation, transport (if any) and storage.

In order to support recording equipment compliant with ISO 16844, the European certification authority and the Member State certification authorities shall, in addition, ensure the following:

[CSM_036] The European certification authority shall generate Km VU and Km WC , two independent and unique Triple DES keys, and generate Km as:

The European certification authority shall forward these keys, under appropriately secured procedures, to Member States certification authorities at their request.

[CSM_037] Member States certification authorities shall:

  • use Km to encrypt motion sensor data requested by motion sensor manufacturers (data to be encrypted with Km is defined in ISO 16844-3),

  • forward Km VU to vehicle unit manufacturers, under appropriately secured procedures, for insertion in vehicle units,

  • ensure that Km WC will be inserted in all workshop cards ( SensorInstallationSecData in Sensor_Installation_Data elementary file) during card personalisation.

3.1.4. T-DES session keys generation and distribution U.K.

[CSM_012] Vehicle units and tachograph cards shall, as a part of the mutual authentication process, generate and exchange necessary data to elaborate a common Triple DES session key. This exchange of data shall be protected for confidentiality through an RSA crypt-mechanism.

[CSM_013] This key shall be used for all subsequent cryptographic operations using secure messaging. Its validity shall expire at the end of the session (withdrawal of the card or reset of the card) and/or after 240 use (one use of the key = one command using secure messaging sent to the card and associated response).

3.2. Keys U.K.

[CSM_014] RSA keys shall have (whatever the level) the following lengths: modulus n 1024 bits, public exponent e 64 bits maximum, private exponent d 1024 bits.

[CSM_015] Triple DES keys shall have the form (K a , K b , K a ) where K a and K b are independent 64 bits long keys. No parity error detecting bits shall be set.

3.3. Certificates U.K.

[CSM_016] RSA Public key certificates shall be non self-descriptive ’‘ Card Verifiable certificates (Ref.: ISO/IEC 7816-8)

3.3.1. Certificates content U.K.

[CSM_017] RSA Public key certificates are built with the following data in the following order:

Data Format Bytes Obs
CPI INTEGER 1 Certificate profile identifier (′01′ for this version)
CAR OCTET STRING 8 Certification authority reference
CHA OCTET STRING 7 Certificate holder authorisation
EOV TimeReal 4 Certificate end of validity. Optional, ′FF′ padded if not used
CHR OCTET STRING 8 Certificate holder reference
n OCTET STRING 128 Public key (modulus)
e OCTET STRING 8 Public key (public exponent)
164
Notes: U.K.
1. The Certificate Profile Identifier (CPI) delineates the exact structure of an authentication certificate. It can be used as an equipment internal identifier of a relevant headerlist which describes the concatenation of Data Elements within the certificate. U.K.

The headerlist associated with this certificate content is as follows:

2. The Certification Authority Reference (CAR) has the purpose of identifying the certificate issuing CA, in such a way that the data element can be used at the same time as an authority key identifier to reference the public key of the certification authority (for coding, see Key Identifier below). U.K.
3. The Certificate Holder Authorisation ((CHA) is used to identify the rights of the certificate holder. It consists of the Tachograph Application ID and of the type of equipment to which the certificate is intended (according to EquipmentType data element, 00 for a Member State). U.K.
4. Certificate Holder Reference (CHR) has the purpose of identifying uniquely the certificate holder, in such a way that the Data Element can be used at the same time as a Subject Key Identifier to reference the Public Key of the certificate holder. U.K.
5. Key Identifiers uniquely identify certificate holder or certification authorities. They are coded as follows: U.K.
5.1.

Equipment (VU or Card):

Data Equipment serial number Date Type Manufacturer
Length 4 Bytes 2 Bytes 1 Byte 1 Byte
Value Integer mm yy BCD coding Manufacturer specific Manufacturer code

In the case of a VU, the manufacturer, when requesting certificates, may or may not know the identification of the equipment in which the keys will be inserted.

In the first case, the manufacturer will send the equipment identification with the public key to its Member State authority for certification. The certificate will then contain the equipment identification, and the manufacturer must ensure that keys and certificate are inserted in the intended equipment. The Key identifier has the form shown above.

In the later case, the manufacturer must uniquely identify each certificate request and send this identification with the public key to its Member State authority for certification. The certificate will contain the request identification. The manufacturer must feed back its Member State authority with the assignment of key to equipment (i.e. certificate request identification, equipment identification) after key installation in the equipment. The key identifier has the following form:

Data Certificate request serial number Date Type Manufacturer
Length 4 Bytes 2 Bytes 1 Byte 1 Byte
Value [F3Integer] [X1mm yy BCD coding] ′FF′ Manufacturer code
5.2.

Certification Authority:

Data Authority identification Key serial number Additional info Identifier
Length 4 Bytes 1 Byte 2 Bytes 1 Byte
Value 1 Byte nation numerical code Integer additional coding (CA specific) ′01′
3 Bytes nation alphanumerical code ′FF FF′ if not used

The key serial number is used to distinguish the different keys of a Member State, in the case the key is changed.

6. Certificate verifiers shall implicitly know that the public key certified is an RSA key relevant to authentication, digital signature verification and encipherement for confidentiality services (the certificate contains no Object Identifier to specify it). U.K.
3.3.2. Certificates issued U.K.

[CSM_018] The certificate issued is a digital signature with partial recovery of the certificate content in accordance with ISO/IEC 9796-2 [F4except for its Annex A.4] , with the Certification Authority Reference appended.

With certificate content

Notes: U.K.
1. This certificate is 194 bytes long. U.K.
2. CAR, being hidden by the signature, is also appended to the signature, such that the public key of the certification authority may be selected for the verification of the certificate. U.K.
3. The certificate verifier shall implicitly know the algorithm used by the certification authority to sign the certificate. U.K.
4. The headerlist associated with this issued certificate is as follows: U.K.

3.3.3. Certificate verification and unwrapping U.K.

Certificate verification and unwrapping consists in verifying the signature in accordance with ISO/IEC 9796-2, retrieving the certificate content and the public key contained: X.PK = X.CA.PK o X.C, and verifying the validity of the certificate.

[CSM_019] It involves the following steps:

  • verify signature and retrieve content:

    • from X.C retrieve Sign, C n ′ and CAR′:

    • from CAR′ select appropriate Certification Authority Public Key (if not done before through other means)

    • open Sign with CA Public Key: Sr′ = X.CA.PK [Sign],

    • check Sr′ starts with ′6A′ and ends with ′BC′

    • compute Cr′ and H′ from:

    • Recover certificate content C′ = C r ′ || C n ′,

    • check Hash (C′) = H′

  • If the checks are OK the certificate is a genuine one, its content is C′.

  • Verify validity. From C′:

    • if applicable, check End of validity date,

  • Retrieve and store public key, Key Identifier, Certificate Holder Authorisation and Certificate End of Validity from C′:

    • X.PK = n || e

    • X.KID = CHR

    • X.CHA = CHA

    • X.EOV = EOV.] ]

Back to top

Options/Help

Print Options

You have chosen to open the Whole Regulation

The Whole Regulation you have selected contains over 200 provisions and might take some time to download. You may also experience some issues with your browser, such as an alert box that a script is taking a long time to run.

Would you like to continue?

You have chosen to open Schedules only

The Schedules you have selected contains over 200 provisions and might take some time to download. You may also experience some issues with your browser, such as an alert box that a script is taking a long time to run.

Would you like to continue?

Close

Legislation is available in different versions:

Latest Available (revised):The latest available updated version of the legislation incorporating changes made by subsequent legislation and applied by our editorial team. Changes we have not yet applied to the text, can be found in the ‘Changes to Legislation’ area.

Original (As adopted by EU): The original version of the legislation as it stood when it was first adopted in the EU. No changes have been applied to the text.

Close

See additional information alongside the content

Geographical Extent: Indicates the geographical area that this provision applies to. For further information see ‘Frequently Asked Questions’.

Show Timeline of Changes: See how this legislation has or could change over time. Turning this feature on will show extra navigation options to go to these specific points in time. Return to the latest available version by using the controls above in the What Version box.

Close

Opening Options

Different options to open legislation in order to view more content on screen at once

Close

More Resources

Access essential accompanying documents and information for this legislation item from this tab. Dependent on the legislation item being viewed this may include:

  • the original print PDF of the as adopted version that was used for the EU Official Journal
  • lists of changes made by and/or affecting this legislation item
  • all formats of all associated documents
  • correction slips
  • links to related legislation and further information resources
Close

Timeline of Changes

This timeline shows the different versions taken from EUR-Lex before exit day and during the implementation period as well as any subsequent versions created after the implementation period as a result of changes made by UK legislation.

The dates for the EU versions are taken from the document dates on EUR-Lex and may not always coincide with when the changes came into force for the document.

For any versions created after the implementation period as a result of changes made by UK legislation the date will coincide with the earliest date on which the change (e.g an insertion, a repeal or a substitution) that was applied came into force. For further information see our guide to revised legislation on Understanding Legislation.

Close

More Resources

Use this menu to access essential accompanying documents and information for this legislation item. Dependent on the legislation item being viewed this may include:

  • the original print PDF of the as adopted version that was used for the print copy
  • correction slips

Click 'View More' or select 'More Resources' tab for additional information including:

  • lists of changes made by and/or affecting this legislation item
  • confers power and blanket amendment details
  • all formats of all associated documents
  • links to related legislation and further information resources