xmlns:atom="http://www.w3.org/2005/Atom" xmlns:atom="http://www.w3.org/2005/Atom"

Please note that the date you requested in the address for this web page is not an actual date upon which a change occurred to this item of legislation. You are being shown the legislation from , which is the first date before then upon which a change was made.

ANNEX I CU.K. Requirements for construction, testing, installation, and inspection

Appendix 11

COMMON SECURITY MECHANISMS U.K.

PART AU.K. FIRST-GENERATION TACHOGRAPH SYSTEM
3.KEYS AND CERTIFICATESU.K.
3.3. Certificates U.K.
CSM_016RSA Public key certificates shall be ‘non self-descriptive’‘Card Verifiable’ certificates (Ref.: ISO/IEC 7816-8)U.K.
3.3.1 Certificates content U.K.
CSM_017RSA Public key certificates are built with the following data in the following order:U.K.
DataFormatBytesObs
CPIINTEGER1Certificate Profile Identifier (‘01’ for this version)
CAROCTET STRING8Certification Authority Reference
CHAOCTET STRING7Certificate Holder Authorisation
EOVTimeReal4Certificate end of validity. Optional, ‘FF’ padded if not used.
CHROCTET STRING8Certificate Holder Reference
nOCTET STRING128Public key (modulus)
eOCTET STRING8Public Key (public exponent)
164
Notes: U.K.
1.The ‘Certificate Profile Identifier’ (CPI) delineates the exact structure of an authentication certificate. It can be used as an equipment internal identifier of a relevant headerlist which describes the concatenation of Data Elements within the certificate.U.K.

The headerlist associated with this certificate content is as follows:

‘4D’‘16’‘5F 29’‘01’‘42’‘08’‘5F 4B’‘07’‘5F 24’‘04’‘5F 20’‘08’‘7F 49’‘05’‘81’‘81 80’‘82’‘08’
Extended Headerlist TagLength of header listCPI TagCPI LengthCAR TagCAR LengthCHA TagCHA LengthEOV TagEOV LengthCHR TagCHR LengthPublic Key Tag (Constructed)Length of subsequent DOsmodulus Tagmodulus lengthpublic exponent Tagpublic exponent length
2.The ‘Certification Authority Reference’ (CAR) has the purpose of identifying the certificate issuing CA, in such a way that the Data Element can be used at the same time as an Authority Key Identifier to reference the Public Key of the Certification Authority (for coding, see Key Identifier below).U.K.
3.The ‘Certificate Holder Authorisation’ (CHA) is used to identify the rights of the certificate holder. It consists of the Tachograph Application ID and of the type of equipment to which the certificate is intended (according to data element, ‘00’ for a Member State).U.K.
4.The ‘Certificate Holder Reference’ (CHR) has the purpose of identifying uniquely the certificate holder, in such a way that the Data Element can be used at the same time as a Subject Key Identifier to reference the Public Key of the certificate holder.U.K.
5.Key Identifiers uniquely identify certificate holder or certification authorities. They are coded as follows:U.K.
5.1

Equipment (VU or Card):

DataEquipment serial numberDateTypeManufacturer
Length4 Bytes2 Bytes1 Byte1 Byte
ValueIntegermm yy BCD codingManufacturer specificManufacturer code

In the case of a VU, the manufacturer, when requesting certificates, may or may not know the identification of the equipment in which the keys will be inserted.

In the first case, the manufacturer will send the equipment identification with the public key to its Member State authority for certification. The certificate will then contain the equipment identification, and the manufacturer must ensure that keys and certificate are inserted in the intended equipment. The Key identifier has the form shown above.

In the later case, the manufacturer must uniquely identify each certificate request and send this identification with the public key to its Member State authority for certification. The certificate will contain the request identification. The manufacturer must feed back its Member State authority with the assignment of key to equipment (i.e. certificate request identification, equipment identification) after key installation in the equipment. The key identifier has the following form:

DataCertificate request serial numberDateTypeManufacturer
Length4 Bytes2 Bytes1 Byte1 Byte
ValueIntegermm yy BCD coding‘FF’Manufacturer code
5.2

Certification Authority:

DataAuthority IdentificationKey serial numberAdditional infoIdentifier
Length4 Bytes1 Byte2 Bytes1 Byte
Value

1 Byte nation numerical code

3 Bytes nation alphanumerical code

Integer

additional coding

(CA specific)

‘FF FF’ if not used

‘01’

The key serial number is used to distinguish the different keys of a Member State, in the case the key is changed.

6.Certificate verifiers shall implicitly know that the public key certified is an RSA key relevant to authentication, digital signature verification and encipherement for confidentiality services (the certificate contains no Object Identifier to specify it).U.K.
3.3.2 Certificates issued U.K.
CSM_018The certificate issued is a digital signature with partial recovery of the certificate content in accordance with ISO/IEC 9796-2 (except for its annex A4), with the ‘Certification Authority Reference’ appended.U.K.

X.C = X.CA.SK[‘6A’ || Cr || Hash(Cc) || ‘BC’] || Cn || X.CAR

With certificate content = Cc =Cr||Cn
106 bytes58 bytes
Notes: U.K.
1.This certificate is 194 bytes long.U.K.
2.CAR, being hidden by the signature, is also appended to the signature, such that the Public Key of the Certification Authority may be selected for the verification of the certificate.U.K.
3.The certificate verifier shall implicitly know the algorithm used by the Certification Authority to sign the certificate.U.K.
4.The headerlist associated with this issued certificate is as follows:U.K.
‘7F 21’‘09’‘5F 37’‘81 80’‘5F 38’‘3A’‘42’‘08’
CV Certificate Tag (Constructed)Length of subsequent DOsSignature TagSignature LengthRemainder TagRemainder LengthCAR TagCAR Length
3.3.3 Certificate verification and unwrapping U.K.

Certificate verification and unwrapping consists in verifying the signature in accordance with ISO/IEC 9796-2, retrieving the certificate content and the public key contained: X.PK = X.CA.PK o X.C, and verifying the validity of the certificate.

CSM_019It involves the following steps:U.K.