Language
RUEN
ES
FR
AR
CH
Login
RUEN
ES
FR
AR
CH
Doc 9303. Part 11. Edition 8
Last modified:1/1/2021
Machine Readable Travel Documents. Part 11. Security Mechanisms for MRTDs
Buy access
INFO
Text
Editions
Modifications
Links To
Links From
In Catalogs
search
Approved by and published under the authority of the Secretary GeneralINTERNATIONAL CIVIL AVIATION ORGANIZATIONDoc 9303Machine Readable Travel DocumentsPart 11 Security Mechanisms for MRTDs Eighth Edition, 2021
Published in separate English, Arabic, Chinese, French, Russian and Spanish editions by the INTERNATIONAL CIVIL AVIATION ORGANIZATION 999 Robert-Bourassa Boulevard, Montral, Quebec, Canada H3C 5H7 Downloads and additional information are available at www.icao.int/Security/FAL/TRIP Doc 9303, Machine Readable Travel Documents Part 11 Security Mechanisms for MRTDs Order No. 9303P11 ISBN 978-92-9265-419-1 print version ICAO 2021 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, without prior permission in writing from the International Civil Aviation Organization.
iii AMENDMENTS Amendments are announced in the supplements to the Products and Services Catalogue the Catalogue and its supplements are available on the ICAO website at www.icao.int. The space below is provided to keep a record of such amendments. RECORD OF AMENDMENTS AND CORRIGENDA AMENDMENTS CORRIGENDA No. Date Entered by No. Date Entered by The designations employed and the presentation of the material in this publication do not imply the expression of any opinion whatsoever on the part of ICAO concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries.
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
EXAMPLE
To view full book Buy access
Table Of Contents
COVER PAGE
AMENDMENTS
TABLE OF CONTENTS
1. SCOPE
2. ASSUMPTIONS AND NOTATIONS
2.1 Requirements for eMRTD Chips and Terminals
2.2 Notations
3. SECURING ELECTRONIC DATA
4. ACCESS TO THE CONTACTLESS IC
4.1 Compliant Configurations
4.2 Chip Access Procedure
4.3 Basic Access Control
4.4 Password Authenticated Connection Establishment
5. AUTHENTICATION OF DATA
5.1 Passive Authentication
6. AUTHENTICATION OF THE CONTACTLESS IC
6.1 Active Authentication
6.2 Chip Authentication
7. ADDITIONAL ACCESS CONTROL MECHANISMS
7.1 Terminal Authentication
7.2 Encryption of Additional Biometrics
8. INSPECTION SYSTEM
8.1 Basic Access Control
8.2 Password Authenticated Connection Establishment
8.3 Passive Authentication
8.4 Active Authentication
8.5 Chip Authentication
8.6 Terminal Authentication
8.7 Decryption of Additional Biometrics
9. COMMON SPECIFICATIONS
9.1 ASN.1 Structures
9.2 Information on Supported Protocols and Supported Applications
9.3 APDUs
9.4 Public Key Data Objects
9.5 Domain Parameters
9.6 Key Agreement Algorithms
9.7 Key Derivation Mechanism
9.8 Secure Messaging
10. REFERENCES (NORMATIVE)
Appendix A to Part 11. ENTROPY OF MRZ-DERIVED ACCESS KEYS (INFORMATIVE)
Appendix B to Part 11. POINT ENCODING FOR THE ECDH-INTEGRATED MAPPING (INFORMATIVE)
B.1 HIGH-LEVEL DESCRIPTION OF THE POINT ENCODING METHOD
B.2 IMPLEMENTATION FOR AFFINE COORDINATES
B.3 IMPLEMENTATION FOR JACOBIAN COORDINATES
Appendix C to Part 11. CHALLENGE SEMANTICS (INFORMATIVE)
D.1 COMPUTE KEYS FROM KEY SEED (KSEED)
D.2 DERIVATION OF DOCUMENT BASIC ACCESS KEYS (KENC AND KMAC)
D.3 AUTHENTICATION AND ESTABLISHMENT OF SESSION KEYS
D.4 SECURE MESSAGING
G.1 ECDH BASED EXAMPLE
G.2 DH BASED EXAMPLE
H.1 ECDH BASED EXAMPLE
H.2 DH BASED EXAMPLE
I.1 ECDH BASED EXAMPLE
Appendix J to Part 11. INSPECTION PROCEDURES (INFORMATIVE)
J.1 INSPECTION PROCEDURE FOR eMRTD APPLICATION
J.2 INSPECTION PROCEDURE FOR MULTI-APPLICATION eMRTDS
Appendix K to Part 11. EUROPEAN EXTENDED ACCESS CONTROL (INFORMATIVE)
K.1 ACCESS RIGHTS
K.2 EF.CVCA