1
Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Chipset-ID and chipset master key pair
7 Key ladder
7.1 Overview
7.2 Key ladder computations
7.3 Usage rules information
7.4 Additional key layers
7.5 Associated data 2
8 Authentication mechanism
8.1 Overview
8.2 Authentication mechanism computations
9 Data conversion primitives
9.1 BS2OSP
9.2 OS2BSP
9.3 I2BSP
10 Cryptographic operations
10.1 Symmetric encryption scheme
10.2 Public-key encryption scheme
10.3 Digital signature scheme
10.4 Function h
10.5 Message authentication code algorithm
Appendix I – Areas for
further development
Bibliography