Cardpaymentprotocolssecurity 2.1
Cardpaymentprotocolssecurity 2.1
8
9
10
11
12 Version 2.1
13 1st April 2017
14
15 TABLE OF CONTENTS
16
17 1 Introduction ........................................................................................................................... 5
18 1.1 What’s new in the edition 2 ...............................................................................................................5
19 1.2 References .......................................................................................................................................5
20 1.3 Protection of Messages ....................................................................................................................6
21 1.4 Recommendations. ...........................................................................................................................6
22 2 Cryptographic Message Syntax (CMS) Data Structure ...................................................... 7
23 2.1 Introduction .......................................................................................................................................7
24 2.2 CMS Data Structure Usage ..............................................................................................................8
25 3 Key Management Mechanisms .......................................................................................... 18
26 3.1 DUKPT Key Management ..............................................................................................................19
27 3.1.1 Key Management ............................................................................................................................ 19
28 3.1.2 Resulting CMS Structure ................................................................................................................. 20
29 3.1.3 PIN Encryption Key ......................................................................................................................... 21
30 3.1.4 Data Encryption Key ........................................................................................................................ 21
31 3.1.5 Message Authentication Key ........................................................................................................... 22
32 3.1.6 Examples ......................................................................................................................................... 22
33 3.1.6.1 Base Key and Terminal Initial Key ........................................................................................................... 22
34 3.1.6.2 CMS Key Management Data ................................................................................................................... 23
35 3.1.6.3 Generation of the Keys ............................................................................................................................ 24
36 3.2 UKPT Key Management .................................................................................................................26
37 3.2.1 Resulting CMS Structure ................................................................................................................. 26
38 3.2.2 Triple DES UKPT Key Management ................................................................................................ 28
39 3.2.3 AES UKPT Key Management .......................................................................................................... 29
40 3.2.4 IBM CCA UKPT Key Management .................................................................................................. 30
41 3.2.5 Examples ......................................................................................................................................... 31
42 3.2.5.1 Triple DES UKPT..................................................................................................................................... 31
43 3.2.5.2 AES UKPT............................................................................................................................................... 33
44 3.2.5.3 IBM CCA UKPT ....................................................................................................................................... 34
45 3.3 RSAES-OAEP Key Encryption .......................................................................................................36
46 3.3.1 Key Management ............................................................................................................................ 36
47 3.3.2 Resulting CMS Structure ................................................................................................................. 37
48 3.3.3 Key Encryption Process................................................................................................................... 38
49 3.3.4 MG1 Mask Generator Function Process.......................................................................................... 40
50 3.3.5 Key Decryption Process .................................................................................................................. 41
51 3.3.6 Examples ......................................................................................................................................... 43
52 3.3.6.1 RSA Encryption Key and Certificate......................................................................................................... 43
53 3.3.6.2 RSAES-OAEP Encryption........................................................................................................................ 48
54 3.3.6.3 RSADS-OAEP Decryption ....................................................................................................................... 59
55 3.4 RSAEncryption Key Encryption ......................................................................................................66
56 3.4.1 Key Management ............................................................................................................................ 66
57 3.4.2 Resulting CMS Structure ................................................................................................................. 66
58 3.4.3 Key Encryption Process................................................................................................................... 67
59 3.4.4 Key Decryption Process .................................................................................................................. 68
-2-
Card Payment Protocols Security Version 2.1
-3-
Card Payment Protocols Security Version 2.1
103 Figures
104
105 Figure 1: Messages Data Protection ...................................................................................................6
106 Figure 2: Generic ContentInformationType Overview ..........................................................................7
107 Figure 3: Key Management for an Encryption Key or a MAC Key ......................................................18
108 Figure 4: Key Serial Number Details..................................................................................................19
109 Figure 5 : PIN Encryption Key Variant ...............................................................................................21
110 Figure 6 : Data Encryption Key ..........................................................................................................21
111 Figure 7 : Message Authentication Key Variant for X9.4-1:2009 ........................................................22
112 Figure 8: Triple DES UKPT Session Key Generation .........................................................................28
113 Figure 9: AES UKPT Session Key Generation ...................................................................................29
114 Figure 10: IBM CCA UKPT Session Key Generation .........................................................................30
115 Figure 11 : RSAES-OAEP Encryption ...............................................................................................39
116 Figure 12 : MG1 Mask Generator Function ........................................................................................40
117 Figure 13 : RSADS-OAEP Decryption ...............................................................................................42
118 Figure 14 : CBC Encryption Process .................................................................................................83
119 Figure 15 : CBC Decryption Process .................................................................................................84
120 Figure 16 : Special Encryption/Decryption .........................................................................................85
121 Figure 17 : Retail-CBC-MAC with SHA-256 .......................................................................................94
122 Figure 18 : CMAC with SHA-256 .......................................................................................................95
123 Figure 19 : Generation of CMAC Subkeys .........................................................................................96
124 Figure 20 : SHA-256 with RSA Digital Signature.............................................................................. 105
125
126
127
-4-
Card Payment Protocols Security Version 2.1
128 1 Introduction
129 This document contains the specifications of the security to protect the nexo protocol messages.
130 These specifications might be used for the following protocols:
131 The nexo Acquirer protocol (ISO 20022 CAPE messages, business area caaa),
132 The nexo TMS protocol (ISO 20022 CAPE messages, business area catm),
133 The nexo ATM protocol (ISO 20022 CAPE messages, business area catp),
134 The nexo Retailer protocol, Sale to POI protocol.
135
136 The document specifies all the security mechanisms which might be used by one of these protocols.
137
ContentType
EnvelopedData SignedData
AuthenticatedData DigestedData
2 Cryptographic Message Syntax (CMS) Data Structure -8- 2.2 CMS Data Structure Usage
Card Payment Protocols Security Version 2.1
2 Cryptographic Message Syntax (CMS) Data Structure -9- 2.2 CMS Data Structure Usage
Card Payment Protocols Security Version 2.1
2 Cryptographic Message Syntax (CMS) Data Structure - 10 - 2.2 CMS Data Structure Usage
Card Payment Protocols Security Version 2.1
2 Cryptographic Message Syntax (CMS) Data Structure - 11 - 2.2 CMS Data Structure Usage
Card Payment Protocols Security Version 2.1
2 Cryptographic Message Syntax (CMS) Data Structure - 12 - 2.2 CMS Data Structure Usage
Card Payment Protocols Security Version 2.1
2 Cryptographic Message Syntax (CMS) Data Structure - 13 - 2.2 CMS Data Structure Usage
Card Payment Protocols Security Version 2.1
2 Cryptographic Message Syntax (CMS) Data Structure - 14 - 2.2 CMS Data Structure Usage
Card Payment Protocols Security Version 2.1
2 Cryptographic Message Syntax (CMS) Data Structure - 15 - 2.2 CMS Data Structure Usage
Card Payment Protocols Security Version 2.1
239
240 The layout of the CMS data structure could also be presented by this component view.
241
2 Cryptographic Message Syntax (CMS) Data Structure - 16 - 2.2 CMS Data Structure Usage
Card Payment Protocols Security Version 2.1
242
243 Figure 3: Component view of the CMS data structure.
244
245
2 Cryptographic Message Syntax (CMS) Data Structure - 17 - 2.2 CMS Data Structure Usage
Card Payment Protocols Security Version 2.1
DerivationIdentification EncryptedKey
5 bytes 5 bytes
299
300
301 Figure 5: Key Serial Number Details
302
303 The KSN has always the same value for the two messages of the same exchange (request and
304 response).
305
306
307
327
328 The same data structure is used for the two messages of the same exchange.
329
330
xor xor
xor xor
key key
3DES 3DES
xor xor
474 Iteration 21
475 R8 bit set: 25 A5 01 E2 90 20 00 17
476 R8A = R8 xor CurKey-rh: D7 59 5C 67 B4 F3 66 24
477 R8A = (R8A)CurKey-lh: 8D 9E C2 47 97 D1 61 D9
478 R8A = R8A xor CurKey-rh: 7F 62 9F C2 B3 02 07 EA
479 CurKey xor Mask: A1 10 68 07 04 E8 67 A4 32 3C 9D 45 24 D3 66 33
480 R8B = R8 xor CurKey-rh: 17 99 9C A7 B4 F3 66 24
481 R8B = (R8B)CurKey-lh: 6D 59 6C EE D6 8E A3 92
482 R8B = R8B xor CurKey-rh: 5F 65 F1 AB F2 5D C5 A1
483 CurKey: 5F 65 F1 AB F2 5D C5 A1 7F 62 9F C2 B3 02 07 EA
484
485 PIN Encryption Key:
486 Applying the mask defined in section 3.1.3 PIN Encryption Key, the variant of the key for PIN
487 encryption is then:
488 CurKey xor PINVariant: 5F 65 F1 AB F2 5D C5 5E 7F 62 9F C2 B3 02 07 15
489 With the parity bits applied to the key:
490 PIN Encryption Key: 5E 64 F1 AB F2 5D C4 5E 7F 62 9E C2 B3 02 07 15
491
492
493 Data Encryption Key:
494 Applying the mask defied in section 0
495 Data Encryption Key, the variant of the key for data encryption is then:
496 The encryption key for the request or advice messages:
497 CurKey xor EncVariantReq: 5F 65 F1 AB F2 A2 C5 A1 7F 62 9F C2 B3 FD 07 EA
498 TDES(CurKey)CurKey: A7 5C 21 F7 04 51 74 44 3F 28 24 9C 3B 08 A7 2B
499 With the parity bits applied to the key:
500 Data Encryption Key Req: A7 5D 20 F7 04 51 75 45 3E 29 25 9D 3B 08 A7 2A
501 The encryption key for the response messages:
502 CurKey xor EncVariantResp: 5F 65 F1 54 F2 5D C5 A1 7F 62 9F 3D B3 02 07 EA
503 TDES(CurKey)CurKey: ED 7E 8A 3D 76 05 2B EA E6 9E E6 88 61 61 3B E2
504 With the parity bits applied to the key:
505 Data Encryption Key Resp: EC 7F 8A 3D 76 04 2A EA E6 9E E6 89 61 61 3B E3
506
507
508 Message Authentication Key:
509 The MAC key for the request or advice messages:
510 CurKey xor MACVariantReq: 5F 65 F1 AB F2 5D 3A A1 7F 62 9F C2 B3 02 F8 EA
511 With the parity bits applied to the key:
512 MAC Key Req: 5E 64 F1 AB F2 5D 3B A1 7F 62 9E C2 B3 02 F8 EA
513 The MAC key for the response messages:
514 CurKey xor MACVariantResp: 5F 65 F1 AB 0D 5D C5 A1 7F 62 9F C2 4C 02 07 EA
515 With the parity bits applied to the key:
516 MAC Key Resp: 5E 64 F1 AB 0D 5D C4 A1 7F 62 9E C2 4C 02 07 EA
517
518
519
525 The CMS data structures that are used to retrieve the UKPT session keys are the following:
526 1. EnvelopedData to convey encrypted sensitive data.
527 One occurrence of EnvelopedData/Recipient contains the information to retrieve the
528 encryption session key,
529 2. AuthenticatedData to convey the MAC of a message.
530 One occurrence of AuthenticatedData/Recipient contains the information to retrieve the MAC
531 session key,
532
533 The Recipient element of EnvelopedData and AuthenticatedData for UKPT key management is
534 presented in the table below:
UKPT Key Mult. Usage
Recipient [1..1] Information related to the UKPT key for the recipient.
KEK [1..1] UKPT uses the KEK choice.
Version [0..1] default 4
Version of the data structure, current version is 4.
KEKIdentification [1..1] Identification of the Master Session key MK.
KeyIdentification [1..1] Name of the key. Test keys must include the suffix "TestKey".
KeyVersion [1..1] The version of the Master Session key.
When the value represents the date of activation, it must use the format
YYYYMMDDhh where:
YYYY is a 4-digits numeral representing the year, 0000 is prohibited
MM is a 2-digits numeral representing the month (from 01 to 12)
DD is a 2-digits numeral representing the day of the month (from 01 to 31)
hh is a 2-digits numeral representing the hours (from 00 to 23)
KeyEncryptionAlgorithm [1..1] Algorithm to encrypt the key encryption key.
Algorithm [1..1] Symmetric encryption algorithm for the protection of the encryption key.
Allowed values:
DES112CBC Triple DES (D Encryption Standard) with double length key
(112 Bit) as defined in FIPS PUB 46-3
section 3.2.2: Triple DES UKPT Key Management
UKPT UKPT (Unique Key Per Transaction) key encryption, using
Triple DES encryption with a double length key (112 Bit) and
IBM CCA control vectors.
section 3.2.4: IBM CCA UKPT Key Management
UKPTwithAES128 UKPT (Unique Key Per Transaction) key encryption,
using Advanced Encryption Standard with a 128 bits
cryptographic key, approved by the Federal Information
Processing Standards (FIPS 197 - November 6, 2001 -
Advanced Encryption Standard).
section 0:
AES UKPT Key Management
EncryptedKey [1..1] see following sections :
3.2.2: Triple DES UKPT Key Management
3.2.4: IBM CCA UKPT Key Management
0:
AES UKPT Key Management
535 The same value for the data structures KEKIdentification and KeyEncryptionAlgorithm must be used
536 for the two messages of the same exchange.
537 However to use different session keys, the value of EncryptedKey must be different for the two
538 messages of the same exchange.
539
8 bytes 8 bytes
EncryptedKey
Initialisation Vector (IV)
00 00 00 00 00 00 00 00 xor xor
MK 3DES-1 MK 3DES-1
parity
Session Key
562
563 Figure 9: Triple DES UKPT Session Key Generation
564
565
566
MK AES-1
Session Key
583
584 Figure 10: AES UKPT Session Key Generation
585
586
587
EncryptedKey
8 bytes 8 bytes
key key
3DES-1 3DES-1
Parity
Session Key
612
613 Figure 11: IBM CCA UKPT Session Key Generation
614
629 (ii) Decrypt the first block with the Master Session Key identified by KEKIdentification
630 Decrypted Block 1 = 877162B8 EB9557D3
631 (iii) Compute a XOR with the given result and the second block of EncryptedKey
632 Decrypted Block 1 XOR Block 2 = F2FE66F0 6C440596
633 (iv) Decrypt the result of the XOR with the Master Session Key identified by KEKIdentification
634 Decrypted Block 2 = 949088E1 C3BA954E
637 (vi) Impose odd parity to each of the 16 bytes on the least significant bit to obtain the Session Key
638 Odd-parity adjusted Session Key = 867062B9 EA9457D3 949189E0 C2BA944F
639
640 The Recipient data structure is presented in the table below:
641
Message Item Value
Recipient
KEK
KEKIdentification
KeyIdentification SpecV1TestKey
KeyVersion 2010060715
KeyEncryptionAlgorithm
Algorithm DES112CBC
EncryptedKey F5DBFB9D229BEF77758F044887D15245
642
643 The resulting XML encoded structure is:
644 <Rcpt>
645 <KEK>
646 <KEKId>
647 <KeyId>SpecV1TestKey</KeyId>
648 <KeyVrsn>2010060715</KeyVrsn>
649 </KEKId>
650 <KeyNcrptnAlgo>
651 <Algo>E3DC</Algo>
652 </KeyNcrptnAlgo>
653 <NcrptdKey>9dv7nSKb73d1jwRIh9FSRQ==</NcrptdKey>
654 </KEK>
655 </Rcpt>
656
657
658 Once unnecessary spaces and carriage returns are removed, Recipient data structure is:
659 0000 3C 52 63 70 74 3E 3C 4B 45 4B 3E 3C 4B 45 4B 49 |<Rcpt><KEK><KEKI|
660 0010 64 3E 3C 4B 65 79 49 64 3E 53 70 65 63 56 31 54 |d><KeyId>SpecV1T|
661 0020 65 73 74 4B 65 79 3C 2F 4B 65 79 49 64 3E 3C 4B |estKey</KeyId><K|
662 0030 65 79 56 72 73 6E 3E 32 30 31 30 30 36 30 37 31 |eyVrsn>201006071|
663 0040 35 3C 2F 4B 65 79 56 72 73 6E 3E 3C 2F 4B 45 4B |5</KeyVrsn></KEK|
664 0050 49 64 3E 3C 4B 65 79 4E 63 72 70 74 6E 41 6C 67 |Id><KeyNcrptnAlg|
665 0060 6F 3E 3C 41 6C 67 6F 3E 45 33 44 43 3C 2F 41 6C |o><Algo>E3DC</Al|
666 0070 67 6F 3E 3C 2F 4B 65 79 4E 63 72 70 74 6E 41 6C |go></KeyNcrptnAl|
667 0080 67 6F 3E 3C 4E 63 72 70 74 64 4B 65 79 3E 39 64 |go><NcrptdKey>9d|
668 0090 76 37 6E 53 4B 62 37 33 64 31 6A 77 52 49 68 39 |v7nSKb73d1jwRIh9|
669 00A0 46 53 52 51 3D 3D 3C 2F 4E 63 72 70 74 64 4B 65 |FSRQ==</NcrptdKe|
670 00B0 79 3E 3C 2F 4B 45 4B 3E 3C 2F 52 63 70 74 3E |y></KEK></Rcpt> |
671
702 Once unnecessary spaces and carriage returns are removed, Recipient data structure is:
703 0000 3C 52 63 70 74 3E 3C 4B 45 4B 3E 3C 4B 45 4B 49 |<Rcpt><KEK><KEKI|
704 0010 64 3E 3C 4B 65 79 49 64 3E 53 70 65 63 56 31 54 |d><KeyId>SpecV1T|
705 0020 65 73 74 4B 65 79 3C 2F 4B 65 79 49 64 3E 3C 4B |estKey</KeyId><K|
706 0030 65 79 56 72 73 6E 3E 32 30 31 30 30 36 30 37 31 |eyVrsn>201006071|
707 0040 35 3C 2F 4B 65 79 56 72 73 6E 3E 3C 2F 4B 45 4B |5</KeyVrsn></KEK|
708 0050 49 64 3E 3C 4B 65 79 4E 63 72 70 74 6E 41 6C 67 |Id><KeyNcrptnAlg|
709 0060 6F 3E 3C 41 6C 67 6F 3E 55 4B 41 31 3C 2F 41 6C |o><Algo>UKA1</Al|
710 0070 67 6F 3E 3C 2F 4B 65 79 4E 63 72 70 74 6E 41 6C |go></KeyNcrptnAl|
711 0080 67 6F 3E 3C 4E 63 72 70 74 64 4B 65 79 3E 39 64 |go><NcrptdKey>9d|
712 0090 76 37 6E 53 4B 62 37 33 64 31 6A 77 52 49 68 39 |v7nSKb73d1jwRIh9|
713 00A0 46 53 52 51 3D 3D 3C 2F 4E 63 72 70 74 64 4B 65 |FSRQ==</NcrptdKe|
714 00B0 79 3E 3C 2F 4B 45 4B 3E 3C 2F 52 63 70 74 3E |y></KEK></Rcpt> |
715
716
717
818
819
DB (ii)
(i)
empty string SHA256 LH
00 00 00
mLen-(hLen+1)
00 01
KT KT
mLen-(hLen+1)
hLen
(iii) SD MGF1
(iv)
DBM xor
(v)
hLen
MGF1 MDB
(vi)
SDM
xor
(vii) EM (viii)
MSD 00
MSD
(ix)
EncryptedKey RSA
849
850 Figure 12 : RSAES-OAEP Encryption
851
852
C 00 00 00 00 C 00 00 00 01 C xx xx xx xx
mLen
866
867 Figure 13 : MG1 Mask Generator Function
868
869
870
(vi) DB (v)
LH LH’
00 00 00
(vii) 00 01
KT KT
mLen-(hLen+1)
(iii)
SD MGF1
(iv)
DBM xor
hLen
MGF1 MDB
(ii)
SDM
xor
EM (i)
MSD 00
MSD
Private key K
mLen-(hLen+1)
MDB
EncryptedKey RSA
897
898 Figure 14 : RSADS-OAEP Decryption
899
900
905
906 This RSA key is authenticated by a certificate authority with the following informations:
Certificate Information Value
serialNumber 7895 CA35 014C 3D2F 1E11 B10D
Issuer
Country Name BE
Organisation Name EPASOrg
Organisation Unit Name Technical Center of Expertise
Common Name EPAS Protocols Test CA
Validity
notBefore 20130418101823+0100
notAfter 20181001182005+0100
Subject
Country Name FR
Organisation Name EPASOrg
Organisation Unit Name Technical Center of Expertise
Common Name EPAS Protocol Test Host Key Encryption
Extensions
keyUsage KeyEncipherment
907
908 The dump of the X.509 certificate is:
909 0000 30 82 05 25 30 82 03 0D A0 03 02 01 02 02 0C 78 |0..%0..........x|
910 0010 95 CA 35 01 4C 3D 2F 1E 11 B1 0D 30 0D 06 09 2A |..5.L=/....0...*|
911 0020 86 48 86 F7 0D 01 01 0B 05 00 30 68 31 0B 30 09 |.H........0h1.0.|
912 0030 06 03 55 04 06 13 02 42 45 31 10 30 0E 06 03 55 |..U....BE1.0...U|
913 0040 04 0A 13 07 45 50 41 53 4F 72 67 31 26 30 24 06 |....EPASOrg1&0$.|
914 0050 03 55 04 0B 13 1D 54 65 63 68 6E 69 63 61 6C 20 |.U....Technical |
915 0060 43 65 6E 74 65 72 20 6F 66 20 45 78 70 65 72 74 |Center of Expert|
916 0070 69 73 65 31 1F 30 1D 06 03 55 04 03 13 16 45 50 |ise1.0...U....EP|
917 0080 41 53 20 50 72 6F 74 6F 63 6F 6C 73 20 54 65 73 |AS Protocols Tes|
918 0090 74 20 43 41 30 2A 17 13 32 30 31 33 30 34 31 38 |t CA0*..20130418|
919 00A0 31 30 31 38 32 33 2B 30 31 30 30 17 13 32 30 31 |101823+0100..201|
920 00B0 38 31 30 30 31 31 38 32 30 30 35 2B 30 31 30 30 |81001182005+0100|
921 00C0 30 78 31 0B 30 09 06 03 55 04 06 13 02 46 52 31 |0x1.0...U....FR1|
922 00D0 10 30 0E 06 03 55 04 0A 13 07 45 50 41 53 4F 72 |.0...U....EPASOr|
923 00E0 67 31 26 30 24 06 03 55 04 0B 13 1D 54 65 63 68 |g1&0$..U....Tech|
924 00F0 6E 69 63 61 6C 20 43 65 6E 74 65 72 20 6F 66 20 |nical Center of |
925 0100 45 78 70 65 72 74 69 73 65 31 2F 30 2D 06 03 55 |Expertise1/0-..U|
926 0110 04 03 13 26 45 50 41 53 20 50 72 6F 74 6F 63 6F |...&EPAS Protoco|
927 0120 6C 20 54 65 73 74 20 48 6F 73 74 20 4B 65 79 20 |l Test Host Key |
928 0130 45 6E 63 72 79 70 74 69 6F 6E 30 82 01 A2 30 0D |Encryption0...0.|
929 0140 06 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 82 01 |..*.H...........|
930 0150 8F 00 30 82 01 8A 02 82 01 81 00 D7 2C CF 63 FB |..0.........,.c.|
931 0160 2F 86 6A 18 F2 19 DC 91 93 16 49 5F F6 6C 90 6F |/.j.......I_.l.o|
932 0170 90 4D 7B 26 65 25 C3 7F AB E7 D4 ED 99 EA 04 24 |.M{&e%.........$|
933 0180 33 6D 99 B0 B7 97 9D E1 76 4E 7C D1 6B 64 B9 BA |3m......vN|.kd..|
934 0190 95 46 10 BC AC BB 6C FD A4 CB 90 6A A7 5B ED 58 |.F....l....j.[.X|
935 01A0 B9 A0 03 71 52 54 1E B1 DC 3D D0 B6 21 4E B3 1B |...qRT...=..!N..|
936 01B0 E9 7A 4F 91 07 34 12 DE 04 22 16 FA 8F 82 6D 24 |.zO..4..."....m$|
Exponent 2 483FC1FB5F079AFF26FDD1D24FE3BDBDDC09DE9BF9B71D3B8AF2FFA70C1CBCAF
EB50D3136D30C58E6F543BB91091D36E02A574463A9A6399D7FE2EAED6E5A51F
8B8073FAE5D1377C7307D60D39B6C6F3B933D0089955D64DF4C67B63BF608F3F
2841C770515CD5EDA4007209D15DEDBC756034C698119E803D40D578A32E4E62
D3DFF4FC381B60B933430EC1336AC6DAB65BE2069542DF23EB61B8240D6DEA96
54122CE061909BB485041AB0EE735490270D161D58F13C95EBE1F7BA8542F4CF
6C8EF391F33973ED1FB8AB62213B33C8FD300F38A774591BFD4C550BD32F88E6
0922B8C261376E7A8570A8373771BE172495DE8A209E681ABEF0216729F37F31
Coefficient 6978A387C201384A23F0E0BCD73737787364460ACF34F2B103AE60181A3E2DAF
D4F26B819F4B1ED7CD9E8CF225922365ACFB408ACC2E87207E339CF72059B94B
09552BFFAED96E486CE29AABDC8B95DA948B19F26CE702FD4D40867B50F5CFF5
7361BD181A7B4AFF4D80C547A5CBF9D2D51E9A1D1C729FF12E84129DCB132DC9
DCEE79F45456A05F232E1B3C31CA02D56EBDBC031C81A85DDE3CA2A5E4CD2F5B
C7D6394AA7F20022B74ED11A730C8C7024053C36500658D10C0622668C41E627
AF714A6EB76BCDC0B888F8AB4046DC5F158D08A5D7F388C76C7F022CE1834FDE
2B443126A9209274DED029D7D4FF7AC4B5AB0C88E8DEFD592D440AE254FBB422
995
996
1000
1001
1002 Step (i): Digest LH of the empty string Label
1003 The block LH, SHA-256 digest of the empty string, is:
1004 0000 E3 B0 C4 42 98 FC 1C 14 9A FB F4 C8 99 6F B9 24 |...B.........o.$|
1005 0010 27 AE 41 E4 64 9B 93 4C A4 95 99 1B 78 52 B8 55 |'.A.d..L....xR.U|
1006
1007
1008 Step (ii): Building of the block DB
1009 The RSA encryption key has a modulus length mLen of 384.
1010 The SHA-256 digest has a length hLen of 32.
1011
1012 The bloc DB has a length of 384 - (32+1)= 351 bytes:
1013 0000 E3 B0 C4 42 98 FC 1C 14 9A FB F4 C8 99 6F B9 24 |...B.........o.$|
1014 0010 27 AE 41 E4 64 9B 93 4C A4 95 99 1B 78 52 B8 55 |'.A.d..L....xR.U|
1015 0020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
1016 0030 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
1017 0040 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
1018 0050 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
1019 0060 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
1020 0070 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
1021 0080 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
1022 0090 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
1023 00A0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
1024 00B0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
1025 00C0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
1026 00D0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
1027 00E0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
1028 00F0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
1029 0100 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
1030 0110 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
1031 0120 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
1032 0130 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
1033 0140 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 AE |................|
1034 0150 EF 80 98 A7 3D E9 D6 5B BF 26 64 58 04 02 16 |....=..[.&dX... |
1035
1036
1037 Step (iii): Generation of the Seed SD
1038 We consider the following seed SD:
1039 0000 3F AE 5D 13 77 C7 30 7D 60 D3 9B 6C 6F 3B 93 3D |?.].w.0}`..lo;.=|
1040 0010 01 89 95 5D 64 DF 4C 67 B6 3B F6 08 F3 F2 84 1C |...]d.Lg.;......|
1041
1042
1309 Inside the EnvelopedData CMS data structure, the Recipient data structure is presented in the table
1310 below:
Message Item Value
Recipient
KeyTransport
Version 0
RecipientIdentification
IssuerAndSerialNumber
Issuer
RelativeDistinguishedName
AtributeType CountryName
AttributeName BE
RelativeDistinguishedName
AtributeType OrganisationName
AttributeName EPASOrg
RelativeDistinguishedName
AtributeType OrganisationUnitName
AttributeName Technical Center of Expertise
RelativeDistinguishedName
AtributeType CommonName
AttributeName EPAS Protocols Test CA
SerialNumber 7895CA35014C3D2F1E11B10D
KeyEncryptionAlgorithm
Algorithm RSAES-OAEP
Parameter
DigestAlgorithm SHA256
MaskGeneratorAlgorithm
Algorithm MGF1
Parameter
DigestAlgorithm SHA256
EncryptedKey 0E8E4709FA83A32B80635BD7D0F7F8B9EEA814E9D2B77A34
9584F524DBDF60764B16CE42715F01D749FCB4EFB2517711
A49DFD6D6F8E8187519C8FA7B7FF928EC1783ED707DBC7D5
79BC089A6EAA876CDD0616E9322C0ACF4318B42B5835DD5B
2C2FFAE546264D615F7988E0D4DC53F6204BD635B1B724F0
51F846939ED113B1A390EE6B02E11412BBD24D5F73653205
9D54E48C9A6739C1CE5D48B0A69067EA7624CFA44BD8BD7E
FD2D3EBE58763989C74ACA5B38F38DD0C8EEFFEE7FECA8A5
475E0E3D3298007AC6E9442A6DD31B7D3C1BAEF5A6DEB337
AAFFA4836E8D091EEF982AECC0BA5FB05E486B51DA820264
20261A8F055C40B4F3608D7B07FFC20C71694A9EDC2A548B
72CAC2DC382DB1AFF7E0F61FF9068601CA903A1F2C598FFF
D886EC23A925F6F34E49BEAC43836D76EFC8B388F4F2CBE6
45AD1014C329E8092CA3717C884DA86A7FA58E8D96DB3157
851A5698F55DBA0C4D2621A0E158AE0687869531AF1C6B1F
E4CA99B1C5D21E116923B909427D5B9496B582C62D15BA69
1311
1312 The XML encoded structure of the Recipient data structure in the EnvelopedData CMS data structure
1313 is:
1314 <Rcpt>
1315 <KeyTrnsprt>
1316 <Vrsn>0</Vrsn>
1317 <RcptId>
1318 <IssrAndSrlNb>
1319 <Issr>
1320 <RltvDstngshdNm>
1321 <AttrTp>CATT</AttrTp>
1322 <AttrVal>BE</AttrVal>
1323 </RltvDstngshdNm>
1324 <RltvDstngshdNm>
1325 <AttrTp>OATT</AttrTp>
1326 <AttrVal>EPASOrg</AttrVal>
1327 </RltvDstngshdNm>
1328 <RltvDstngshdNm>
1329 <AttrTp>OUAT</AttrTp>
1330 <AttrVal>Technical Center of Expertise</AttrVal>
1331 </RltvDstngshdNm>
1332 <RltvDstngshdNm>
1333 <AttrTp>CNAT</AttrTp>
1334 <AttrVal>EPAS Protocols Test CA</AttrVal>
1335 </RltvDstngshdNm>
1336 </Issr>
1337 <SrlNb>eJXKNQFMPS8eEbEN</SrlNb>
1338 </IssrAndSrlNb>
1339 </RcptId>
1340 <KeyNcrptnAlgo>
1341 <Algo>RSAO</Algo>
1342 <Param>
1343 <DgstAlgo>HS25</DgstAlgo>
1344 <MskGnrtrAlgo>
1345 <Algo>MGF1</Algo>
1346 <Param>
1347 <DgstAlgo>HS25</DgstAlgo>
1348 </Param>
1349 </MskGnrtrAlgo>
1350 </Param>
1351 </KeyNcrptnAlgo>
1352 <NcrptdKey>
1353 Do5HCfqDoyuAY1vX0Pf4ue6oFOnSt3o0lYT1JNvfYHZLFs5CcV8B10n8tO+yUXcRpJ39bW+OgYdRnI
1354 +nt/+SjsF4PtcH28fVebwImm6qh2zdBhbpMiwKz0MYtCtYNd1bLC/65UYmTWFfeYjg1NxT9iBL1jWx
1355 tyTwUfhGk57RE7GjkO5rAuEUErvSTV9zZTIFnVTkjJpnOcHOXUiwppBn6nYkz6RL2L1+/S0+vlh2OY
1356 nHSspbOPON0Mju/+5/7KilR14OPTKYAHrG6UQqbdMbfTwbrvWm3rM3qv+kg26NCR7vmCrswLpfsF5I
1357 a1HaggJkICYajwVcQLTzYI17B//CDHFpSp7cKlSLcsrC3Dgtsa/34PYf+QaGAcqQOh8sWY//2IbsI6
1358 kl9vNOSb6sQ4Ntdu/Is4j08svmRa0QFMMp6Akso3F8iE2oan+ljo2W2zFXhRpWmPVdugxNJiGg4Viu
1359 BoeGlTGvHGsf5MqZscXSHhFpI7kJQn1blJa1gsYtFbpp
1360 </NcrptdKey>
1361 </KeyTrnsprt>
1362 </Rcpt>
1363
1364
1365 Once unnecessary spaces and carriage returns are removed, Recipient data structure is:
1366 0000 3C 52 63 70 74 3E 3C 4B 65 79 54 72 6E 73 70 72 |<Rcpt><KeyTrnspr|
1367 0010 74 3E 3C 56 72 73 6E 3E 30 3C 2F 56 72 73 6E 3E |t><Vrsn>0</Vrsn>|
1368 0020 3C 52 63 70 74 49 64 3E 3C 49 73 73 72 41 6E 64 |<RcptId><IssrAnd|
1369 0030 53 72 6C 4E 62 3E 3C 49 73 73 72 3E 3C 52 6C 74 |SrlNb><Issr><Rlt|
1370 0040 76 44 73 74 6E 67 73 68 64 4E 6D 3E 3C 41 74 74 |vDstngshdNm><Att|
1371 0050 72 54 70 3E 43 41 54 54 3C 2F 41 74 74 72 54 70 |rTp>CATT</AttrTp|
1372 0060 3E 3C 41 74 74 72 56 61 6C 3E 42 45 3C 2F 41 74 |><AttrVal>BE</At|
1373 0070 74 72 56 61 6C 3E 3C 2F 52 6C 74 76 44 73 74 6E |trVal></RltvDstn|
1374 0080 67 73 68 64 4E 6D 3E 3C 52 6C 74 76 44 73 74 6E |gshdNm><RltvDstn|
1375 0090 67 73 68 64 4E 6D 3E 3C 41 74 74 72 54 70 3E 4F |gshdNm><AttrTp>O|
1376 00A0 41 54 54 3C 2F 41 74 74 72 54 70 3E 3C 41 74 74 |ATT</AttrTp><Att|
1377 00B0 72 56 61 6C 3E 45 50 41 53 4F 72 67 3C 2F 41 74 |rVal>EPASOrg</At|
1378 00C0 74 72 56 61 6C 3E 3C 2F 52 6C 74 76 44 73 74 6E |trVal></RltvDstn|
1379 00D0 67 73 68 64 4E 6D 3E 3C 52 6C 74 76 44 73 74 6E |gshdNm><RltvDstn|
1380 00E0 67 73 68 64 4E 6D 3E 3C 41 74 74 72 54 70 3E 4F |gshdNm><AttrTp>O|
1381 00F0 55 41 54 3C 2F 41 74 74 72 54 70 3E 3C 41 74 74 |UAT</AttrTp><Att|
1382 0100 72 56 61 6C 3E 54 65 63 68 6E 69 63 61 6C 20 43 |rVal>Technical C|
1383 0110 65 6E 74 65 72 20 6F 66 20 45 78 70 65 72 74 69 |enter of Experti|
1384 0120 73 65 3C 2F 41 74 74 72 56 61 6C 3E 3C 2F 52 6C |se</AttrVal></Rl|
1385 0130 74 76 44 73 74 6E 67 73 68 64 4E 6D 3E 3C 52 6C |tvDstngshdNm><Rl|
1386 0140 74 76 44 73 74 6E 67 73 68 64 4E 6D 3E 3C 41 74 |tvDstngshdNm><At|
1387 0150 74 72 54 70 3E 43 4E 41 54 3C 2F 41 74 74 72 54 |trTp>CNAT</AttrT|
1388 0160 70 3E 3C 41 74 74 72 56 61 6C 3E 45 50 41 53 20 |p><AttrVal>EPAS |
1389 0170 50 72 6F 74 6F 63 6F 6C 73 20 54 65 73 74 20 43 |Protocols Test C|
1390 0180 41 3C 2F 41 74 74 72 56 61 6C 3E 3C 2F 52 6C 74 |A</AttrVal></Rlt|
1391 0190 76 44 73 74 6E 67 73 68 64 4E 6D 3E 3C 2F 49 73 |vDstngshdNm></Is|
1392 01A0 73 72 3E 3C 53 72 6C 4E 62 3E 65 4A 58 4B 4E 51 |sr><SrlNb>eJXKNQ|
1393 01B0 46 4D 50 53 38 65 45 62 45 4E 3C 2F 53 72 6C 4E |FMPS8eEbEN</SrlN|
1394 01C0 62 3E 3C 2F 49 73 73 72 41 6E 64 53 72 6C 4E 62 |b></IssrAndSrlNb|
1395 01D0 3E 3C 2F 52 63 70 74 49 64 3E 3C 4B 65 79 4E 63 |></RcptId><KeyNc|
1396 01E0 72 70 74 6E 41 6C 67 6F 3E 3C 41 6C 67 6F 3E 52 |rptnAlgo><Algo>R|
1397 01F0 53 41 4F 3C 2F 41 6C 67 6F 3E 3C 50 61 72 61 6D |SAO</Algo><Param|
1398 0200 3E 3C 44 67 73 74 41 6C 67 6F 3E 48 53 32 35 3C |><DgstAlgo>HS25<|
1399 0210 2F 44 67 73 74 41 6C 67 6F 3E 3C 4D 73 6B 47 6E |/DgstAlgo><MskGn|
1400 0220 72 74 72 41 6C 67 6F 3E 3C 41 6C 67 6F 3E 4D 47 |rtrAlgo><Algo>MG|
1401 0230 46 31 3C 2F 41 6C 67 6F 3E 3C 50 61 72 61 6D 3E |F1</Algo><Param>|
1402 0240 3C 44 67 73 74 41 6C 67 6F 3E 48 53 32 35 3C 2F |<DgstAlgo>HS25</|
1403 0250 44 67 73 74 41 6C 67 6F 3E 3C 2F 50 61 72 61 6D |DgstAlgo></Param|
1404 0260 3E 3C 2F 4D 73 6B 47 6E 72 74 72 41 6C 67 6F 3E |></MskGnrtrAlgo>|
1405 0270 3C 2F 50 61 72 61 6D 3E 3C 2F 4B 65 79 4E 63 72 |</Param></KeyNcr|
1406 0280 70 74 6E 41 6C 67 6F 3E 3C 4E 63 72 70 74 64 4B |ptnAlgo><NcrptdK|
1407 0290 65 79 3E 44 6F 35 48 43 66 71 44 6F 79 75 41 59 |ey>Do5HCfqDoyuAY|
1408 02A0 31 76 58 30 50 66 34 75 65 36 6F 46 4F 6E 53 74 |1vX0Pf4ue6oFOnSt|
1409 02B0 33 6F 30 6C 59 54 31 4A 4E 76 66 59 48 5A 4C 46 |3o0lYT1JNvfYHZLF|
1410 02C0 73 35 43 63 56 38 42 31 30 6E 38 74 4F 2B 79 55 |s5CcV8B10n8tO+yU|
1411 02D0 58 63 52 70 4A 33 39 62 57 2B 4F 67 59 64 52 6E |XcRpJ39bW+OgYdRn|
1412 02E0 49 2B 6E 74 2F 2B 53 6A 73 46 34 50 74 63 48 32 |I+nt/+SjsF4PtcH2|
1413 02F0 38 66 56 65 62 77 49 6D 6D 36 71 68 32 7A 64 42 |8fVebwImm6qh2zdB|
1414 0300 68 62 70 4D 69 77 4B 7A 30 4D 59 74 43 74 59 4E |hbpMiwKz0MYtCtYN|
1415 0310 64 31 62 4C 43 2F 36 35 55 59 6D 54 57 46 66 65 |d1bLC/65UYmTWFfe|
1416 0320 59 6A 67 31 4E 78 54 39 69 42 4C 31 6A 57 78 74 |Yjg1NxT9iBL1jWxt|
1417 0330 79 54 77 55 66 68 47 6B 35 37 52 45 37 47 6A 6B |yTwUfhGk57RE7Gjk|
1418 0340 4F 35 72 41 75 45 55 45 72 76 53 54 56 39 7A 5A |O5rAuEUErvSTV9zZ|
1419 0350 54 49 46 6E 56 54 6B 6A 4A 70 6E 4F 63 48 4F 58 |TIFnVTkjJpnOcHOX|
1420 0360 55 69 77 70 70 42 6E 36 6E 59 6B 7A 36 52 4C 32 |UiwppBn6nYkz6RL2|
1421 0370 4C 31 2B 2F 53 30 2B 76 6C 68 32 4F 59 6E 48 53 |L1+/S0+vlh2OYnHS|
1422 0380 73 70 62 4F 50 4F 4E 30 4D 6A 75 2F 2B 35 2F 37 |spbOPON0Mju/+5/7|
1423 0390 4B 69 6C 52 31 34 4F 50 54 4B 59 41 48 72 47 36 |KilR14OPTKYAHrG6|
1424 03A0 55 51 71 62 64 4D 62 66 54 77 62 72 76 57 6D 33 |UQqbdMbfTwbrvWm3|
1425 03B0 72 4D 33 71 76 2B 6B 67 32 36 4E 43 52 37 76 6D |rM3qv+kg26NCR7vm|
1426 03C0 43 72 73 77 4C 70 66 73 46 35 49 61 31 48 61 67 |CrswLpfsF5Ia1Hag|
1427 03D0 67 4A 6B 49 43 59 61 6A 77 56 63 51 4C 54 7A 59 |gJkICYajwVcQLTzY|
1428 03E0 49 31 37 42 2F 2F 43 44 48 46 70 53 70 37 63 4B |I17B//CDHFpSp7cK|
1429 03F0 6C 53 4C 63 73 72 43 33 44 67 74 73 61 2F 33 34 |lSLcsrC3Dgtsa/34|
1430 0400 50 59 66 2B 51 61 47 41 63 71 51 4F 68 38 73 57 |PYf+QaGAcqQOh8sW|
1431 0410 59 2F 2F 32 49 62 73 49 36 6B 6C 39 76 4E 4F 53 |Y//2IbsI6kl9vNOS|
1470
1471 The value of mLen is 384 (or 180)
1472 The value of hLen is 32 (or 20)
1473
1474
1533
1534
1743
1744
1745 Step (vi): Digest LH of the empty string Label
1746
1747 The block LH, SHA-256 digest of the empty string, is:
1748 0000 E3 B0 C4 42 98 FC 1C 14 9A FB F4 C8 99 6F B9 24 |...B.........o.$|
1749 0010 27 AE 41 E4 64 9B 93 4C A4 95 99 1B 78 52 B8 55 |'.A.d..L....xR.U|
1750
1751
1752 Step (vii): Retrieving the data (KT key)
1753
1754 The data block DB is split in 3 blocks: LH’ || PS || M || KT
1755 LH’ and LH, of length 32 (or 20), have the same value,
1756 PS the largest string following LH’ of hexadecimal of value 00, has a length of 302 (or 12E) bytes
1757 M, the following byte, has the value 01,
1758 The data, or KT key, is:
1759 0000 AE EF 80 98 A7 3D E9 D6 5B BF 26 64 58 04 02 16 |.....=..[.&dX...|
1760
1761
1762
1791
EM (ii)
k-(mLen+3) 00 02
(i)
Random PSS
k
00
mLen KT KT
(iii)
Public key K
EncryptedKey RSA
1809
1810 Figure 15 : Encryption step of RSAEncryption
1811
1812
(ii)
k-(mLen+3) KT
EM (i)
00 02
EncryptedKey RSA 00
KT
1824
1825 Figure 16 : RSAEncryption Decryption
1826
1827
1832
1833 This RSA key is authenticated by a certificate authority with the following informations:
Certificate Information Value
serialNumber 7895 CA35 014C 3D2F 1E11 B10D
Issuer
Country Name BE
Organisation Name EPASOrg
Organisation Unit Name Technical Center of Expertise
Common Name EPAS Protocols Test CA
Validity
notBefore 20130418101823+0100
notAfter 20181001182005+0100
Subject
Country Name FR
Organisation Name EPASOrg
Organisation Unit Name Technical Center of Expertise
Common Name EPAS Protocol Test Host Key Encryption
Extensions
keyUsage KeyEncipherment
1834
1835 The dump of the X.509 certificate is:
1836 0000 30 82 05 25 30 82 03 0D A0 03 02 01 02 02 0C 78 |0..%0..........x|
1837 0010 95 CA 35 01 4C 3D 2F 1E 11 B1 0D 30 0D 06 09 2A |..5.L=/....0...*|
1838 0020 86 48 86 F7 0D 01 01 0B 05 00 30 68 31 0B 30 09 |.H........0h1.0.|
1839 0030 06 03 55 04 06 13 02 42 45 31 10 30 0E 06 03 55 |..U....BE1.0...U|
1840 0040 04 0A 13 07 45 50 41 53 4F 72 67 31 26 30 24 06 |....EPASOrg1&0$.|
1841 0050 03 55 04 0B 13 1D 54 65 63 68 6E 69 63 61 6C 20 |.U....Technical |
1842 0060 43 65 6E 74 65 72 20 6F 66 20 45 78 70 65 72 74 |Center of Expert|
1843 0070 69 73 65 31 1F 30 1D 06 03 55 04 03 13 16 45 50 |ise1.0...U....EP|
1844 0080 41 53 20 50 72 6F 74 6F 63 6F 6C 73 20 54 65 73 |AS Protocols Tes|
1845 0090 74 20 43 41 30 2A 17 13 32 30 31 33 30 34 31 38 |t CA0*..20130418|
1846 00A0 31 30 31 38 32 33 2B 30 31 30 30 17 13 32 30 31 |101823+0100..201|
1847 00B0 38 31 30 30 31 31 38 32 30 30 35 2B 30 31 30 30 |81001182005+0100|
1848 00C0 30 78 31 0B 30 09 06 03 55 04 06 13 02 46 52 31 |0x1.0...U....FR1|
1849 00D0 10 30 0E 06 03 55 04 0A 13 07 45 50 41 53 4F 72 |.0...U....EPASOr|
1850 00E0 67 31 26 30 24 06 03 55 04 0B 13 1D 54 65 63 68 |g1&0$..U....Tech|
1851 00F0 6E 69 63 61 6C 20 43 65 6E 74 65 72 20 6F 66 20 |nical Center of |
1852 0100 45 78 70 65 72 74 69 73 65 31 2F 30 2D 06 03 55 |Expertise1/0-..U|
1853 0110 04 03 13 26 45 50 41 53 20 50 72 6F 74 6F 63 6F |...&EPAS Protoco|
1854 0120 6C 20 54 65 73 74 20 48 6F 73 74 20 4B 65 79 20 |l Test Host Key |
1855 0130 45 6E 63 72 79 70 74 69 6F 6E 30 82 01 A2 30 0D |Encryption0...0.|
1856 0140 06 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 82 01 |..*.H...........|
1857 0150 8F 00 30 82 01 8A 02 82 01 81 00 D7 2C CF 63 FB |..0.........,.c.|
1858 0160 2F 86 6A 18 F2 19 DC 91 93 16 49 5F F6 6C 90 6F |/.j.......I_.l.o|
1859 0170 90 4D 7B 26 65 25 C3 7F AB E7 D4 ED 99 EA 04 24 |.M{&e%.........$|
1860 0180 33 6D 99 B0 B7 97 9D E1 76 4E 7C D1 6B 64 B9 BA |3m......vN|.kd..|
1861 0190 95 46 10 BC AC BB 6C FD A4 CB 90 6A A7 5B ED 58 |.F....l....j.[.X|
1862 01A0 B9 A0 03 71 52 54 1E B1 DC 3D D0 B6 21 4E B3 1B |...qRT...=..!N..|
1863 01B0 E9 7A 4F 91 07 34 12 DE 04 22 16 FA 8F 82 6D 24 |.zO..4..."....m$|
Exponent 2 483FC1FB5F079AFF26FDD1D24FE3BDBDDC09DE9BF9B71D3B8AF2FFA70C1CBCAF
EB50D3136D30C58E6F543BB91091D36E02A574463A9A6399D7FE2EAED6E5A51F
8B8073FAE5D1377C7307D60D39B6C6F3B933D0089955D64DF4C67B63BF608F3F
2841C770515CD5EDA4007209D15DEDBC756034C698119E803D40D578A32E4E62
D3DFF4FC381B60B933430EC1336AC6DAB65BE2069542DF23EB61B8240D6DEA96
54122CE061909BB485041AB0EE735490270D161D58F13C95EBE1F7BA8542F4CF
6C8EF391F33973ED1FB8AB62213B33C8FD300F38A774591BFD4C550BD32F88E6
0922B8C261376E7A8570A8373771BE172495DE8A209E681ABEF0216729F37F31
Coefficient 6978A387C201384A23F0E0BCD73737787364460ACF34F2B103AE60181A3E2DAF
D4F26B819F4B1ED7CD9E8CF225922365ACFB408ACC2E87207E339CF72059B94B
09552BFFAED96E486CE29AABDC8B95DA948B19F26CE702FD4D40867B50F5CFF5
7361BD181A7B4AFF4D80C547A5CBF9D2D51E9A1D1C729FF12E84129DCB132DC9
DCEE79F45456A05F232E1B3C31CA02D56EBDBC031C81A85DDE3CA2A5E4CD2F5B
C7D6394AA7F20022B74ED11A730C8C7024053C36500658D10C0622668C41E627
AF714A6EB76BCDC0B888F8AB4046DC5F158D08A5D7F388C76C7F022CE1834FDE
2B443126A9209274DED029D7D4FF7AC4B5AB0C88E8DEFD592D440AE254FBB422
1922
1926
1927 Step (i): We generate PS
1928 0000 9F 15 79 F3 28 09 85 62 4C 16 F1 6A BE 14 A5 0F |..y.(..bL..j....|
1929 0010 FD 2B 80 40 BA 40 12 19 1B D4 B2 98 BF D2 F5 0B |.+.@.@..........|
1930 0020 28 3D 80 89 9C F2 1D 0A 20 C3 39 57 72 83 57 F5 |(=...... .9Wr.W.|
1931 0030 20 B4 D4 5C 9F 8F 35 05 AC D5 64 5C 49 40 BE 9C | ..\..5...d\I@..|
1932 0040 D8 8F 6D EB 3C 85 F0 7F 1E AF DA 8E 5D 28 2E 2B |..m.<.......](.+|
1933 0050 EF FD 43 6D EF 10 D2 66 61 11 84 26 4A 67 06 7C |..Cm...fa..&Jg.||
1934 0060 DB A5 63 E7 B5 DB CD D4 54 31 0E ED 71 E8 76 D3 |..c.....T1..q.v.|
1935 0070 38 03 91 F8 C8 F7 DC 06 CF 9E DF CC 0D 10 F4 75 |8..............u|
1936 0080 46 BB 68 60 BC 81 AE 3C E6 2E 92 9C B0 65 1F 2C |F.h`...<.....e.,|
1937 0090 60 03 42 B3 DC 61 3B 95 EA 21 F8 B8 06 51 31 B2 |`.B..a;..!...Q1.|
1938 00A0 0B 71 82 B6 25 1B FA 69 3C 89 7F C0 76 30 6F 50 |.q..%..i<...v0oP|
1939 00B0 0A B0 35 E3 D1 9F 64 06 DA 43 94 8A 2D C6 50 57 |..5...d..C..-.PW|
1940 00C0 22 3D AD AE F3 E6 C1 4D B2 AE 42 5D 1F 83 BD 0B |"=.....M..B]....|
1941 00D0 70 04 E9 4D 15 19 87 AF 73 EA ED 49 0D 60 C3 E2 |p..M....s..I.`..|
1942 00E0 F4 E9 95 99 DA 79 5E BC 3B 2F 5F 20 B2 A3 55 38 |.....y^.;/_ ..U8|
1943 00F0 99 B6 A8 59 69 D1 08 4C 0D D3 3A D1 04 8D E8 9B |...Yi..L..:.....|
1944 0100 FE 97 28 3B 84 EB 70 D0 17 10 BE 3B 07 11 EF A3 |..(;..p....;....|
1945 0110 81 A8 4B 43 2F 4C 5A 97 14 DD 42 D0 4C D7 A7 30 |..KC/LZ...B.L..0|
1946 0120 C6 0B D3 60 95 57 43 A0 C6 79 94 43 68 21 2D 59 |...`.WC..y.Ch!-Y|
1947 0130 71 48 AE 7A F6 09 7B FB 48 9E 27 54 E7 E5 AD ED |qH.z..{.H.'T....|
1948 0140 49 FD 36 43 C3 5D 2C 70 A8 7B B9 B2 0C 10 B0 7B |I.6C.],p.{.....{|
1949 0150 3B 62 8A E4 77 22 25 73 4C 85 39 D4 E7 B0 C0 1E |;b..w"%sL.9.....|
1950 0160 3C 6A 90 41 E9 63 D4 86 E0 CD 46 01 7F |<j.A.c....F.. |
1951
1952
1953
1954 Step (ii): We build the EM block
1955 The block EM, result of the concatenation of 00 || 02 || PS || 00 || Kt is then:
1956 0000 00 02 9F 15 79 F3 28 09 85 62 4C 16 F1 6A BE 14 |....y.(..bL..j..|
1957 0010 A5 0F FD 2B 80 40 BA 40 12 19 1B D4 B2 98 BF D2 |...+.@.@........|
1958 0020 F5 0B 28 3D 80 89 9C F2 1D 0A 20 C3 39 57 72 83 |..(=...... .9Wr.|
1959 0030 57 F5 20 B4 D4 5C 9F 8F 35 05 AC D5 64 5C 49 40 |W. ..\..5...d\I@|
1960 0040 BE 9C D8 8F 6D EB 3C 85 F0 7F 1E AF DA 8E 5D 28 |....m.<.......](|
1961 0050 2E 2B EF FD 43 6D EF 10 D2 66 61 11 84 26 4A 67 |.+..Cm...fa..&Jg|
1962 0060 06 7C DB A5 63 E7 B5 DB CD D4 54 31 0E ED 71 E8 |.|..c.....T1..q.|
1963 0070 76 D3 38 03 91 F8 C8 F7 DC 06 CF 9E DF CC 0D 10 |v.8.............|
1964 0080 F4 75 46 BB 68 60 BC 81 AE 3C E6 2E 92 9C B0 65 |.uF.h`...<.....e|
1965 0090 1F 2C 60 03 42 B3 DC 61 3B 95 EA 21 F8 B8 06 51 |.,`.B..a;..!...Q|
1966 00A0 31 B2 0B 71 82 B6 25 1B FA 69 3C 89 7F C0 76 30 |1..q..%..i<...v0|
1967 00B0 6F 50 0A B0 35 E3 D1 9F 64 06 DA 43 94 8A 2D C6 |oP..5...d..C..-.|
1968 00C0 50 57 22 3D AD AE F3 E6 C1 4D B2 AE 42 5D 1F 83 |PW"=.....M..B]..|
1969 00D0 BD 0B 70 04 E9 4D 15 19 87 AF 73 EA ED 49 0D 60 |..p..M....s..I.`|
1970 00E0 C3 E2 F4 E9 95 99 DA 79 5E BC 3B 2F 5F 20 B2 A3 |.......y^.;/_ ..|
1971 00F0 55 38 99 B6 A8 59 69 D1 08 4C 0D D3 3A D1 04 8D |U8...Yi..L..:...|
1972 0100 E8 9B FE 97 28 3B 84 EB 70 D0 17 10 BE 3B 07 11 |....(;..p....;..|
1973 0110 EF A3 81 A8 4B 43 2F 4C 5A 97 14 DD 42 D0 4C D7 |....KC/LZ...B.L.|
1974 0120 A7 30 C6 0B D3 60 95 57 43 A0 C6 79 94 43 68 21 |.0...`.WC..y.Ch!|
1975 0130 2D 59 71 48 AE 7A F6 09 7B FB 48 9E 27 54 E7 E5 |-YqH.z..{.H.'T..|
1976 0140 AD ED 49 FD 36 43 C3 5D 2C 70 A8 7B B9 B2 0C 10 |..I.6C.],p.{....|
1977 0150 B0 7B 3B 62 8A E4 77 22 25 73 4C 85 39 D4 E7 B0 |.{;b..w"%sL.9...|
1978 0160 C0 1E 3C 6A 90 41 E9 63 D4 86 E0 CD 46 01 7F 00 |..<j.A.c....F...|
1979 0170 AE EF 80 98 A7 3D E9 D6 5B BF 26 64 58 04 02 16 |.....=..[.&dX...|
1980
1981 Step (iii): Encryption of the block EM
1982
1983 The encryption of the block EM by the public RSA key is:
1984 0000 CB E3 AB C8 FF CF E4 33 AB 1C 5D 50 43 2F C6 9A |.......3..]PC/..|
1985 0010 49 3D BF FD C1 92 BE 33 13 C2 31 90 06 F5 1C 9C |I=.....3..1.....|
1986 0020 06 44 91 BC 26 06 33 4F 00 B4 84 C4 4E B5 72 03 |.D..&.3O....N.r.|
1987 0030 9B 98 91 08 18 BF D1 00 6F 9B 90 E1 B6 19 81 DA |........o.......|
1988 0040 F2 EC 9A 1A D7 AB 19 EC 60 AB B4 C9 24 C9 74 F8 |........`...$.t.|
1989 0050 79 CF 7D 80 88 B7 A2 63 AA 18 42 3C C8 DD DF 20 |y.}....c..B<... |
1990 0060 54 C9 63 4C A2 A0 13 A3 10 99 C3 9E 2C 94 3E AC |T.cL........,.>.|
1991 0070 80 D2 A5 BD 9C B6 C4 AF ED 8F EB EB C5 9F F1 03 |................|
1992 0080 53 B6 70 03 55 84 B7 A0 0F 41 DD 7F A1 32 24 B2 |S.p.U....A...2$.|
1993 0090 1B 49 24 33 F4 28 CF 0E 1B C6 E5 B2 05 0A DE B5 |.I$3.(..........|
1994 00A0 77 79 A0 48 BB 68 03 E8 CD E6 AA 88 E8 56 C7 F3 |wy.H.h.......V..|
1995 00B0 68 80 9A DE D3 AC 8E 74 9E 60 5B 16 FF 3B DA E8 |h......t.`[..;..|
1996 00C0 4B 6B A9 AB DA 58 2B 13 B1 ED 1E 0B 40 94 1E 75 |[email protected]|
1997 00D0 39 88 9C 12 61 69 D2 64 91 C3 F9 6D C2 C0 EA 08 |9...ai.d...m....|
1998 00E0 C4 5B 21 33 C1 0C 7C 43 03 34 C7 43 C2 3F 58 19 |.[!3..|C.4.C.?X.|
1999 00F0 53 70 3B 02 38 D2 2E 62 A3 F2 EA 1E 0B A8 DA 56 |Sp;.8..b.......V|
2000 0100 76 8E DF 86 18 22 FB CF 72 0A EA 1B A8 28 3E D8 |v...."..r....(>.|
2001 0110 36 4E D5 E3 72 6E CA 9F CF F8 D8 16 CD 24 58 62 |6N..rn.......$Xb|
2002 0120 92 9F 81 52 1B 6E 45 90 DF 5B A3 4B 00 6B 49 2E |...R.nE..[.K.kI.|
2003 0130 7B 55 2E D4 B4 59 97 C7 83 81 D2 35 05 18 99 89 |{U...Y.....5....|
2004 0140 F8 C0 FC 32 E6 55 2A 3E 96 98 B1 B5 31 A7 3C 50 |...2.U*>....1.<P|
2005 0150 11 F0 4B 44 22 3A D9 84 44 24 D0 8F 57 78 0C 5F |..KD":..D$..Wx._|
2006 0160 77 B8 28 91 A3 AD 44 39 CB A9 83 F9 58 24 A3 53 |w.(...D9....X$.S|
2007 0170 8F F3 8D 2E A6 32 DC C8 A6 BF 84 02 3D AB 54 A5 |.....2......=.T.|
2008
2009
2010
2011 Inside the EnvelopedData CMS data structure, the Recipient data structure is presented in the table
2012 below:
Message Item Value
Recipient
KeyTransport
Version 0
RecipientIdentification
IssuerAndSerialNumber
Issuer
RelativeDistinguishedName
AtributeType CountryName
AttributeName BE
RelativeDistinguishedName
AtributeType OrganisationName
AttributeName EPASOrg
RelativeDistinguishedName
AtributeType OrganisationUnitName
AttributeName Technical Center of Expertise
RelativeDistinguishedName
AtributeType CommonName
AttributeName EPAS Protocols Test CA
SerialNumber 7895CA35014C3D2F1E11B10D
KeyEncryptionAlgorithm
Algorithm RSAEncryption
EncryptedKey CBE3ABC8FFCFE433AB1C5D50432FC69A
493DBFFDC192BE3313C2319006F51C9C
064491BC2606334F00B484C44EB57203
9B98910818BFD1006F9B90E1B61981DA
F2EC9A1AD7AB19EC60ABB4C924C974F8
79CF7D8088B7A263AA18423CC8DDDF20
54C9634CA2A013A31099C39E2C943EAC
80D2A5BD9CB6C4AFED8FEBEBC59FF103
53B670035584B7A00F41DD7FA13224B2
1B492433F428CF0E1BC6E5B2050ADEB5
7779A048BB6803E8CDE6AA88E856C7F3
68809ADED3AC8E749E605B16FF3BDAE8
4B6BA9ABDA582B13B1ED1E0B40941E75
39889C126169D26491C3F96DC2C0EA08
C45B2133C10C7C430334C743C23F5819
53703B0238D22E62A3F2EA1E0BA8DA56
768EDF861822FBCF720AEA1BA8283ED8
364ED5E3726ECA9FCFF8D816CD245862
929F81521B6E4590DF5BA34B006B492E
7B552ED4B45997C78381D23505189989
F8C0FC32E6552A3E9698B1B531A73C50
11F04B44223AD9844424D08F57780C5F
77B82891A3AD4439CBA983F95824A353
8FF38D2EA632DCC8A6BF84023DAB54A5
2013
2014 The XML encoded structure of the Recipient data structure in the EnvelopedData CMS data structure
2015 is:
2016 <Rcpt>
2017 <KeyTrnsprt>
2018 <Vrsn>0</Vrsn>
2019 <RcptId>
2020 <IssrAndSrlNb>
2021 <Issr>
2022 <RltvDstngshdNm>
2023 <AttrTp>CATT</AttrTp>
2024 <AttrVal>BE</AttrVal>
2025 </RltvDstngshdNm>
2026 <RltvDstngshdNm>
2027 <AttrTp>OATT</AttrTp>
2028 <AttrVal>EPASOrg</AttrVal>
2029 </RltvDstngshdNm>
2030 <RltvDstngshdNm>
2031 <AttrTp>OUAT</AttrTp>
2032 <AttrVal>Technical Center of Expertise</AttrVal>
2033 </RltvDstngshdNm>
2034 <RltvDstngshdNm>
2035 <AttrTp>CNAT</AttrTp>
2036 <AttrVal>EPAS Protocols Test CA</AttrVal>
2037 </RltvDstngshdNm>
2038 </Issr>
2039 <SrlNb>eJXKNQFMPS8eEbEN</SrlNb>
2040 </IssrAndSrlNb>
2041 </RcptId>
2042 <KeyNcrptnAlgo>
2043 <Algo>ERSA</Algo>
2044 </KeyNcrptnAlgo>
2045 <NcrptdKey>
2046 y+OryP/P5DOrHF1QQy/Gmkk9v/3Bkr4zE8IxkAb1HJwGRJG8JgYzTwC0hMROtXIDm5iRCBi/0QBvm5D
2047 hthmB2vLsmhrXqxnsYKu0ySTJdPh5z32AiLeiY6oYQjzI3d8gVMljTKKgE6MQmcOeLJQ+rIDSpb2ctsS
2048 v7Y/r68Wf8QNTtnADVYS3oA9B3X+hMiSyG0kkM/Qozw4bxuWyBQretXd5oEi7aAPozeaqiOhWx/NogJr
2049 e06yOdJ5gWxb/O9roS2upq9pYKxOx7R4LQJQedTmInBJhadJkkcP5bcLA6gjEWyEzwQx8QwM0x0PCP1g
2050 ZU3A7AjjSLmKj8uoeC6jaVnaO34YYIvvPcgrqG6goPtg2TtXjcm7Kn8/42BbNJFhikp+BUhtuRZDfW6N
2051 LAGtJLntVLtS0WZfHg4HSNQUYmYn4wPwy5lUqPpaYsbUxpzxQEfBLRCI62YREJNCPV3gMX3e4KJGjrUQ
2052 5y6mD+Vgko1OP840upjLcyKa/hAI9q1Sl
2053 </NcrptdKey>
2054 </KeyTrnsprt>
2055 </Rcpt>
2056
2057
2058 The dump of the XML encoded structure of the Recipient data structure without unnecessary spaces
2059 and tabs is:
2060 0000 3C 52 63 70 74 3E 3C 4B 65 79 54 72 6E 73 70 72 |<Rcpt><KeyTrnspr|
2061 0010 74 3E 3C 56 72 73 6E 3E 30 3C 2F 56 72 73 6E 3E |t><Vrsn>0</Vrsn>|
2062 0020 3C 52 63 70 74 49 64 3E 3C 49 73 73 72 41 6E 64 |<RcptId><IssrAnd|
2063 0030 53 72 6C 4E 62 3E 3C 49 73 73 72 3E 3C 52 6C 74 |SrlNb><Issr><Rlt|
2064 0040 76 44 73 74 6E 67 73 68 64 4E 6D 3E 3C 41 74 74 |vDstngshdNm><Att|
2065 0050 72 54 70 3E 43 41 54 54 3C 2F 41 74 74 72 54 70 |rTp>CATT</AttrTp|
2066 0060 3E 3C 41 74 74 72 56 61 6C 3E 42 45 3C 2F 41 74 |><AttrVal>BE</At|
2067 0070 74 72 56 61 6C 3E 3C 2F 52 6C 74 76 44 73 74 6E |trVal></RltvDstn|
2068 0080 67 73 68 64 4E 6D 3E 3C 52 6C 74 76 44 73 74 6E |gshdNm><RltvDstn|
2069 0090 67 73 68 64 4E 6D 3E 3C 41 74 74 72 54 70 3E 4F |gshdNm><AttrTp>O|
2070 00A0 41 54 54 3C 2F 41 74 74 72 54 70 3E 3C 41 74 74 |ATT</AttrTp><Att|
2071 00B0 72 56 61 6C 3E 45 50 41 53 4F 72 67 3C 2F 41 74 |rVal>EPASOrg</At|
2072 00C0 74 72 56 61 6C 3E 3C 2F 52 6C 74 76 44 73 74 6E |trVal></RltvDstn|
2073 00D0 67 73 68 64 4E 6D 3E 3C 52 6C 74 76 44 73 74 6E |gshdNm><RltvDstn|
2074 00E0 67 73 68 64 4E 6D 3E 3C 41 74 74 72 54 70 3E 4F |gshdNm><AttrTp>O|
2075 00F0 55 41 54 3C 2F 41 74 74 72 54 70 3E 3C 41 74 74 |UAT</AttrTp><Att|
2076 0100 72 56 61 6C 3E 54 65 63 68 6E 69 63 61 6C 20 43 |rVal>Technical C|
2077 0110 65 6E 74 65 72 20 6F 66 20 45 78 70 65 72 74 69 |enter of Experti|
2078 0120 73 65 3C 2F 41 74 74 72 56 61 6C 3E 3C 2F 52 6C |se</AttrVal></Rl|
2079 0130 74 76 44 73 74 6E 67 73 68 64 4E 6D 3E 3C 52 6C |tvDstngshdNm><Rl|
2080 0140 74 76 44 73 74 6E 67 73 68 64 4E 6D 3E 3C 41 74 |tvDstngshdNm><At|
2081 0150 74 72 54 70 3E 43 4E 41 54 3C 2F 41 74 74 72 54 |trTp>CNAT</AttrT|
2082 0160 70 3E 3C 41 74 74 72 56 61 6C 3E 45 50 41 53 20 |p><AttrVal>EPAS |
2083 0170 50 72 6F 74 6F 63 6F 6C 73 20 54 65 73 74 20 43 |Protocols Test C|
2084 0180 41 3C 2F 41 74 74 72 56 61 6C 3E 3C 2F 52 6C 74 |A</AttrVal></Rlt|
2085 0190 76 44 73 74 6E 67 73 68 64 4E 6D 3E 3C 2F 49 73 |vDstngshdNm></Is|
2086 01A0 73 72 3E 3C 53 72 6C 4E 62 3E 65 4A 58 4B 4E 51 |sr><SrlNb>eJXKNQ|
2087 01B0 46 4D 50 53 38 65 45 62 45 4E 3C 2F 53 72 6C 4E |FMPS8eEbEN</SrlN|
2088 01C0 62 3E 3C 2F 49 73 73 72 41 6E 64 53 72 6C 4E 62 |b></IssrAndSrlNb|
2089 01D0 3E 3C 2F 52 63 70 74 49 64 3E 3C 4B 65 79 4E 63 |></RcptId><KeyNc|
2090 01E0 72 70 74 6E 41 6C 67 6F 3E 3C 41 6C 67 6F 3E 45 |rptnAlgo><Algo>E|
2091 01F0 52 53 41 3C 2F 41 6C 67 6F 3E 3C 2F 4B 65 79 4E |RSA</Algo></KeyN|
2092 0200 63 72 70 74 6E 41 6C 67 6F 3E 3C 4E 63 72 70 74 |crptnAlgo><Ncrpt|
2093 0210 64 4B 65 79 3E 79 2B 4F 72 79 50 2F 50 35 44 4F |dKey>y+OryP/P5DO|
2094 0220 72 48 46 31 51 51 79 2F 47 6D 6B 6B 39 76 2F 33 |rHF1QQy/Gmkk9v/3|
2095 0230 42 6B 72 34 7A 45 38 49 78 6B 41 62 31 48 4A 77 |Bkr4zE8IxkAb1HJw|
2096 0240 47 52 4A 47 38 4A 67 59 7A 54 77 43 30 68 4D 52 |GRJG8JgYzTwC0hMR|
2097 0250 4F 74 58 49 44 6D 35 69 52 43 42 69 2F 30 51 42 |OtXIDm5iRCBi/0QB|
2098 0260 76 6D 35 44 68 74 68 6D 42 32 76 4C 73 6D 68 72 |vm5DhthmB2vLsmhr|
2099 0270 58 71 78 6E 73 59 4B 75 30 79 53 54 4A 64 50 68 |XqxnsYKu0ySTJdPh|
2100 0280 35 7A 33 32 41 69 4C 65 69 59 36 6F 59 51 6A 7A |5z32AiLeiY6oYQjz|
2101 0290 49 33 64 38 67 56 4D 6C 6A 54 4B 4B 67 45 36 4D |I3d8gVMljTKKgE6M|
2102 02A0 51 6D 63 4F 65 4C 4A 51 2B 72 49 44 53 70 62 32 |QmcOeLJQ+rIDSpb2|
2103 02B0 63 74 73 53 76 37 59 2F 72 36 38 57 66 38 51 4E |ctsSv7Y/r68Wf8QN|
2104 02C0 54 74 6E 41 44 56 59 53 33 6F 41 39 42 33 58 2B |TtnADVYS3oA9B3X+|
2105 02D0 68 4D 69 53 79 47 30 6B 6B 4D 2F 51 6F 7A 77 34 |hMiSyG0kkM/Qozw4|
2106 02E0 62 78 75 57 79 42 51 72 65 74 58 64 35 6F 45 69 |bxuWyBQretXd5oEi|
2107 02F0 37 61 41 50 6F 7A 65 61 71 69 4F 68 57 78 2F 4E |7aAPozeaqiOhWx/N|
2108 0300 6F 67 4A 72 65 30 36 79 4F 64 4A 35 67 57 78 62 |ogJre06yOdJ5gWxb|
2109 0310 2F 4F 39 72 6F 53 32 75 70 71 39 70 59 4B 78 4F |/O9roS2upq9pYKxO|
2110 0320 78 37 52 34 4C 51 4A 51 65 64 54 6D 49 6E 42 4A |x7R4LQJQedTmInBJ|
2111 0330 68 61 64 4A 6B 6B 63 50 35 62 63 4C 41 36 67 6A |hadJkkcP5bcLA6gj|
2112 0340 45 57 79 45 7A 77 51 78 38 51 77 4D 30 78 30 50 |EWyEzwQx8QwM0x0P|
2113 0350 43 50 31 67 5A 55 33 41 37 41 6A 6A 53 4C 6D 4B |CP1gZU3A7AjjSLmK|
2114 0360 6A 38 75 6F 65 43 36 6A 61 56 6E 61 4F 33 34 59 |j8uoeC6jaVnaO34Y|
2115 0370 59 49 76 76 50 63 67 72 71 47 36 67 6F 50 74 67 |YIvvPcgrqG6goPtg|
2116 0380 32 54 74 58 6A 63 6D 37 4B 6E 38 2F 34 32 42 62 |2TtXjcm7Kn8/42Bb|
2117 0390 4E 4A 46 68 69 6B 70 2B 42 55 68 74 75 52 5A 44 |NJFhikp+BUhtuRZD|
2118 03A0 66 57 36 4E 4C 41 47 74 4A 4C 6E 74 56 4C 74 53 |fW6NLAGtJLntVLtS|
2119 03B0 30 57 5A 66 48 67 34 48 53 4E 51 55 59 6D 59 6E |0WZfHg4HSNQUYmYn|
2120 03C0 34 77 50 77 79 35 6C 55 71 50 70 61 59 73 62 55 |4wPwy5lUqPpaYsbU|
2121 03D0 78 70 7A 78 51 45 66 42 4C 52 43 49 36 32 59 52 |xpzxQEfBLRCI62YR|
2122 03E0 45 4A 4E 43 50 56 33 67 4D 58 33 65 34 4B 4A 47 |EJNCPV3gMX3e4KJG|
2123 03F0 6A 72 55 51 35 79 36 6D 44 2B 56 67 6B 6F 31 4F |jrUQ5y6mD+Vgko1O|
2124 0400 50 38 34 30 75 70 6A 4C 63 79 4B 61 2F 68 41 49 |P840upjLcyKa/hAI|
2156
2157 The value of mLen is 384 (or 180)
2158
2159
2197
2218
2219
2220
2221
4 Encryption Mechanisms - 82 - 4.2 Resulting CMS Structure
Card Payment Protocols Security Version 2.1
M1 M2 Mn
Initialisation
Vector C0 xor xor xor
K E K E K E
C1 C2 Cn
2239
2240 Figure 17 : CBC Encryption Process
2241
C1 C2 Cn
K D K D K D
Initialisation
Vector C0 xor xor xor
M1 M2 Mn
2256
2257 Figure 18 : CBC Decryption Process
2258
2259
2260
2261
2267
2268 The encryption process encrypts directly the plaintext data M (8 bytes for DES and 16 bytes for AES)
2269 without padding and InitialisationVector. The encrypted data is C = EK (M), EK being the encryption
2270 algorithm (TDES or AES) with K.
2271 The decryption process decrypts directly the encrypted data C (8 bytes for DES and 16 bytes for AES)
2272 without InitialisationVector. The decrypted data is M = DK (C), DK being the decryption algorithm
2273 (TDES or AES) with K.
M C
K E K D
C M
2274
2275 Figure 19 : Special Encryption/Decryption
2276
2277
2278
2292
2293 The resulting XML encoded structure is:
2294 <PlainCardData>
2295 <PAN>9913330080574602</PAN>
2296 <CardSeqNb>00</CardSeqNb>
2297 <XpryDt>2014-12</XpryDt>
2298 <CardSctyCd>
2299 <CSCMgmt>PRST</CSCMgmt>
2300 <CSCVal>9915</CSCVal>
2301 </CardSctyCd>
2302 </PlainCardData>
2303
2304 Once unnecessary spaces and carriage returns are removed, PlainCardData is:
2305 0000 3C 50 6C 61 69 6E 43 61 72 64 44 61 74 61 3E 3C |<PlainCardData><|
2306 0010 50 41 4E 3E 39 39 31 33 33 33 30 30 38 30 35 37 |PAN>991333008057|
2307 0020 34 36 30 32 3C 2F 50 41 4E 3E 3C 43 61 72 64 53 |4602</PAN><CardS|
2308 0030 65 71 4E 62 3E 30 30 3C 2F 43 61 72 64 53 65 71 |eqNb>00</CardSeq|
2309 0040 4E 62 3E 3C 58 70 72 79 44 74 3E 32 30 31 34 2D |Nb><XpryDt>2014-|
2310 0050 31 32 3C 2F 58 70 72 79 44 74 3E 3C 43 61 72 64 |12</XpryDt><Card|
2311 0060 53 63 74 79 43 64 3E 3C 43 53 43 4D 67 6D 74 3E |SctyCd><CSCMgmt>|
2312 0070 50 52 53 54 3C 2F 43 53 43 4D 67 6D 74 3E 3C 43 |PRST</CSCMgmt><C|
2313 0080 53 43 56 61 6C 3E 39 39 31 35 3C 2F 43 53 43 56 |SCVal>9915</CSCV|
2314 0090 61 6C 3E 3C 2F 43 61 72 64 53 63 74 79 43 64 3E |al></CardSctyCd>|
2315 00A0 3C 2F 50 6C 61 69 6E 43 61 72 64 44 61 74 61 3E |</PlainCardData>|
2316
2317
2318
2361 Without the content value of Recipient, the EnvelopedData CMS data structure would be :
2362
Message Item Value
ProtectedCardData
ContentType EnvelopedData
EnvelopedData
Recipient
…
EncryptedContent
ContentType PlainData
ContentEncryptionAlgorithm
Algorithm DES112CBC
Parameter
InitialisationVector A27BB46D1C306E09
EncryptedData CB8548F2F3633C4DE9718E0BF185E874
F95AD40BEE69BFCF4EBD240521BA285B
3E94EDF9A53CF70B6F1BFBA0B2BB8E4B
F1DBD3FC64BF7024AC1962801F1083DF
6615849409C482C40E5F1D4B8B8530BE
F2B0916EE7F88E3071679F7161C068C2
67F0EAA64B4370AF93C21A1EA929D634
597DCCBBD647E0CB0892212033CC384E
8FB494E2F11E55D0F9129BFC4B3CBCA4
0A0DB0E83FFA77F12B7A1ABF6A912568
6FC43A9A09C05817D9DC1E61967BD529
BB2CD3D617D378BB
2363
2364
2365
2366
2409 Without the content value of Recipient, the EnvelopedData CMS data structure would be :
2410
Message Item Value
ProtectedCardData
ContentType EnvelopedData
EnvelopedData
Recipient
…
EncryptedContent
ContentType PlainData
ContentEncryptionAlgorithm
Algorithm AES128CBC
Parameter
InitialisationVector A27BB46D1C306E097E26BE8E9363DB28
EncryptedData 7451178380EC033B362531530A965ED5
3069871700A0976F8F3EDB1EC26E897A
E981DF67D6CE39009795C23735291FE5
D135EBE4B26FFAE0963967D3DBC8C27D
F26317387BD70D90584C5A3ED09F101C
F2484D7A95B460571F8D168B3873BC32
E0CDC63284D35B3675983B754FDD4190
B53D4CEF13DD913A865288C0B3A4F097
17E4AA7685C7175FB8112C774F549397
EBB7945B55ACD0F43D9CF020FA4F94C2
CF81B6ACAA45413A256B3B7FB3D12355
04C5316E57DA0C28D5AC2FD575DAF75B
2411
2412
2422
2423
2424
2446
2447
2448
2449
C1 C2 Cn-1 MAC
2475
2476 Figure 20 : Retail-CBC-MAC with SHA-256
2477
2478
2479
C1 C2 Cn-1 MAC
2507
2508 Figure 21 : CMAC with SHA-256
2509
2510
1
This case never happens for D which has the size of an SHA-256 digest.
00 00
K Enc
<<1
L’
<<1
K 1’
xor
K2
2521
2522 Figure 22 : Generation of CMAC Subkeys
2523
2524
2563
2564
2565
2566
2605
2606
2
Since the padding Method 2 is applied, the Retail CBC-MAC follow the algorithm described in section
5.3.1 (Retail-CBC-MAC with SHA-256) without computing the SHA-256 in the step (i) of the algorithm.
2612
2613 Applying the padding process from ISO/IEC 9797-1 method 2, the hexadecimal byte 80 is appended,
2614 followed by 7 null bytes to reach a length of 40 bytes, multiple of 8:
2615 0000 C4 11 A9 4F 56 97 8E A1 8B 9D CA F4 A0 DE 5B 44 |...OV.........[D|
2616 0010 09 BE A9 93 87 58 1A CA E5 01 3D 4A 55 38 AF B0 |.....X....=JU8..|
2617 0020 80 00 00 00 00 00 00 00 |........ |
2618
2619 The test key that will be used is the message authentication DUKPT key for request message:
2620 5E64 F1AB F25D 3BA1 7F62 9EC2 B302 F8EA
2621
2622
2623 The Retail CBC encryption of the padded SHA256 digest provides the value below:
2624 0000 0C 39 D3 CF 05 F9 F4 97 E0 1E 69 DE 5F 23 F8 72 |.9........i._#.r|
2625 0010 81 EC 98 C5 B4 12 CD A4 19 E8 06 D6 F2 03 9F B3 |................|
2626 0020 21 86 58 17 8E B7 E8 F6 |!.X..... |
2627
2628 The MAC of the message is the last 8 bytes: 21 86 58 17 8E B7 E8 F6
2629
2630 The SecurityTrailer data structure with the MAC information is presented in the table below.
2631
2632 Without the content value of Recipient, the AuthenticatedData CMS data structure would be:
Message Item Value
SecurityTrailer
ContentType AuthenticatedData
AuthenticatedData
Recipient
…
MACAlgorithm
Algorithm RetailSHA256MAC
EncapsulatedContent
ContentType PlainData
MAC 218658178EB7E8F6
2633
2634
2635
2645
2646 The most significant bit of L is 0, K1 is then the value of L<<1:
2647 0000 96 9F E0 56 19 EA 21 F8 DC 1A C5 0D A8 67 FB 68 |...V..!......g.h|
2648
2649 The value of K1 is then:
2650 0000 96 9F E0 56 19 EA 21 F8 DC 1A C5 0D A8 67 FB 68 |...V..!......g.h|
2651
2652 The most significant bit of K1 is 1, the value of K1 <<1 is then:
2653 0000 2D 3F C0 AC 33 D4 43 F1 B8 35 8A 1B 50 CF F6 D0 |-?..3.C..5..P...|
2654
2655 The value of K2 = (K1<<1) xor 87 is then:
2656 0000 2D 3F C0 AC 33 D4 43 F1 B8 35 8A 1B 50 CF F6 57 |-?..3.C..5..P..W|
2657
2658 The value of K2 is then:
2659 0000 2D 3F C0 AC 33 D4 43 F1 B8 35 8A 1B 50 CF F6 57 |-?..3.C..5..P..W|
2660
2661
2662
2668
2669 The digest is split in 2 blocks, the last one being a complete block D*2:
2670 0010 09 BE A9 93 87 58 1A CA E5 01 3D 4A 55 38 AF B0 |.....X....=JU8..|
2671
2672 The block D2 = D*2 xor K1, is then:
2673 0000 9F 21 49 C5 9E B2 3B 32 39 1B F8 47 FD 5F 54 D8 |.!I...;29..G._T.|
2674
2675 The blocks D1 to D2 are then:
2676 0000 C4 11 A9 4F 56 97 8E A1 8B 9D CA F4 A0 DE 5B 44 |...OV.........[D|
2677 0010 9F 21 49 C5 9E B2 3B 32 39 1B F8 47 FD 5F 54 D8 |.!I...;29..G._T.|
2678
2679 The CBC encryption provides the value C1 to C2 below:
2680 0000 10 B0 E4 4F BE E2 92 C8 BA 31 07 81 36 AC 52 DE |...O.....1..6.R.|
2681 0010 4B C1 AA 74 F2 BB 58 03 D1 41 EA 97 42 2B 4B 73 |K..t..X..A..B+Ks|
2682
2683 The MAC of the message is the last 16 bytes:
2684 4B C1 AA 74 F2 BB 58 03 D1 41 EA 97 42 2B 4B 73
2685
2686 The SecurityTrailer data structure with the MAC information is presented in the table below.
2687
2688 Without the content value of Recipient, the AuthenticatedData CMS data structure would be :
Message Item Value
SecurityTrailer
ContentType AuthenticatedData
AuthenticatedData
Recipient
…
MACAlgorithm
Algorithm SHA256CMACwithAES128
EncapsulatedContent
ContentType PlainData
MAC 4BC1AA74F2BB5803D141EA97422B4B73
2689
2690
2691
2711
2712
FF 00
RSA
T
D
Message Body
2740
2741 Figure 23 : SHA-256 with RSA Digital Signature
2742
2743
6 Digital Signature Mechanisms - 105 - 6.3 Digital Signature Generation and Verification Processes
Card Payment Protocols Security Version 2.1
6 Digital Signature Mechanisms - 106 - 6.3 Digital Signature Generation and Verification Processes
Card Payment Protocols Security Version 2.1
2764
2765 This RSA key is authenticated by a certificate authority with the following information:
Certificate Information Value
serialNumber 2ABC 40F4 D482 F5EB C975
Issuer
Country Name BE
Organisation Name EPASOrg
Organisation Unit Name Technical Center of Expertise
Common Name EPAS Protocols Test CA
Validity
notBefore 20130418100646+0100
notAfter 20181001182005+0100
Subject
Country Name FR
Organisation Name EPASOrg
Organisation Unit Name Technical Center of Expertise
Common Name EPAS Protocol Test Host Authentication
Extensions
keyUsage DigitalSign
2766
2767 The dump of the X.509 certificate is:
2768 0000 30 82 05 23 30 82 03 0B A0 03 02 01 02 02 0A 2A |0..#0..........*|
2769 0010 BC 40 F4 D4 82 F5 EB C9 75 30 0D 06 09 2A 86 48 |[email protected]...*.H|
2770 0020 86 F7 0D 01 01 0B 05 00 30 68 31 0B 30 09 06 03 |........0h1.0...|
2771 0030 55 04 06 13 02 42 45 31 10 30 0E 06 03 55 04 0A |U....BE1.0...U..|
2772 0040 13 07 45 50 41 53 4F 72 67 31 26 30 24 06 03 55 |..EPASOrg1&0$..U|
2773 0050 04 0B 13 1D 54 65 63 68 6E 69 63 61 6C 20 43 65 |....Technical Ce|
2774 0060 6E 74 65 72 20 6F 66 20 45 78 70 65 72 74 69 73 |nter of Expertis|
2775 0070 65 31 1F 30 1D 06 03 55 04 03 13 16 45 50 41 53 |e1.0...U....EPAS|
2776 0080 20 50 72 6F 74 6F 63 6F 6C 73 20 54 65 73 74 20 | Protocols Test |
2777 0090 43 41 30 2A 17 13 32 30 31 33 30 34 31 38 31 30 |CA0*..2013041810|
2778 00A0 31 38 32 33 2B 30 31 30 30 17 13 32 30 31 38 31 |1823+0100..20181|
2779 00B0 30 30 31 31 38 32 30 30 35 2B 30 31 30 30 30 78 |001182005+01000x|
2780 00C0 31 0B 30 09 06 03 55 04 06 13 02 46 52 31 10 30 |1.0...U....FR1.0|
2781 00D0 0E 06 03 55 04 0A 13 07 45 50 41 53 4F 72 67 31 |...U....EPASOrg1|
2782 00E0 26 30 24 06 03 55 04 0B 13 1D 54 65 63 68 6E 69 |&0$..U....Techni|
2783 00F0 63 61 6C 20 43 65 6E 74 65 72 20 6F 66 20 45 78 |cal Center of Ex|
2784 0100 70 65 72 74 69 73 65 31 2F 30 2D 06 03 55 04 03 |pertise1/0-..U..|
2785 0110 13 26 45 50 41 53 20 50 72 6F 74 6F 63 6F 6C 20 |.&EPAS Protocol |
2786 0120 54 65 73 74 20 48 6F 73 74 20 4B 65 79 20 45 6E |Test Host Key En|
2787 0130 63 72 79 70 74 69 6F 6E 30 82 01 A2 30 0D 06 09 |cryption0...0...|
2788 0140 2A 86 48 86 F7 0D 01 01 01 05 00 03 82 01 8F 00 |*.H.............|
2789 0150 30 82 01 8A 02 82 01 81 00 D7 2C CF 63 FB 2F 86 |0.........,.c./.|
2790 0160 6A 18 F2 19 DC 91 93 16 49 5F F6 6C 90 6F 90 4D |j.......I_.l.o.M|
2791 0170 7B 26 65 25 C3 7F AB E7 D4 ED 99 EA 04 24 33 6D |{&e%.........$3m|
2792 0180 99 B0 B7 97 9D E1 76 4E 7C D1 6B 64 B9 BA 95 46 |......vN|.kd...F|
2793 0190 10 BC AC BB 6C FD A4 CB 90 6A A7 5B ED 58 B9 A0 |....l....j.[.X..|
2794 01A0 03 71 52 54 1E B1 DC 3D D0 B6 21 4E B3 1B E9 7A |.qRT...=..!N...z|
2795 01B0 4F 91 07 34 12 DE 04 22 16 FA 8F 82 6D 24 C7 F2 |O..4..."....m$..|
2796 01C0 D3 05 D4 BF 63 46 5B F8 99 DC 6F 07 3F F6 AA 33 |....cF[...o.?..3|
2797 01D0 8E A4 4D B6 BE 51 A6 35 8C AA 3C CB 85 28 E5 8B |..M..Q.5..<..(..|
2798 01E0 55 54 0E D2 23 25 23 33 33 D3 D6 D2 B8 2E D7 A5 |UT..#%#33.......|
2799 01F0 8D 49 9F 44 5F F8 35 C3 EB D5 B5 15 37 9A 7C 2B |.I.D_.5.....7.|+|
2800 0200 5B 41 D3 5F 3D FD 5A 1A 2D 61 49 10 38 FD D1 9E |[A._=.Z.-aI.8...|
2801 0210 18 EF 67 8F D7 94 87 2A CC 8B 81 29 AF A0 D0 2F |..g....*...).../|
2802 0220 CD 6E 4A DE 91 84 D5 FE C2 38 64 41 29 3B 16 BB |.nJ......8dA);..|
2803 0230 76 B8 E2 E4 F8 E8 02 76 36 68 55 A8 80 E0 EF AC |v......v6hU.....|
2804 0240 44 9E 76 12 4C 4B F7 FF 2B A1 5E 67 4B 62 A5 63 |D.v.LK..+.^gKb.c|
2853 The RSA key of the certificate authority signing this X.509 certificate has a key length of 4096 bits with
2854 the components dumped below:
RSA Key Component Value
Modulus A97F45122196E7353C89C240F5D163CF7B9B6A0899440C3D3F3C431BF898BFDE
121407E57E4B6EA2A85E52742659E05087CBC69E2EF6A301B9000A9DA4216951
B793B70B3D27EA9BD6E80584929C55AA5D315CF691F789E677E52105065CC79C
20C58384DF934640A80E7F970088650663610B80B478B17E5863B910332C89DF
3F1FEE47E8A96E9A413CD69410693FECBA0388D2DDB4B6B33341CF9D523AC561
729C5854512EDE984AEB1D937E3C8F74F527FFEFE710CBD2A6819CA0A3C8C7CB
C237E1B60A66D790E5DFFCE5EF1B8BA241E284FBF32345AC74D179382DA7D714
E63CE04084FD904C3AAE0CAC44CCB17A4DFB4B5917971BE12B24FBC17E1E20DD
DC363E45D1659C80D5FF087C51FBED5846C43C0D3580C1C7E8BE91629FDE96F7
A5E531E0166AFE88CC3AFE4EB642F9E51F02E007CB482B4E91D588965F53C73D
8CA2A2D4F7A8663F492CB1623906417A553C9D4DFB2CF55CE6290956C5E80009
7F0E8C974E879BCB981977377FA6A3750DBF478F57C0C7338F45BA83F54670E3
5DDBAC4E30665338A75C0D61DF6918721E885054C85BC3CACD2206468C8A84BB
8B3432CE2D8B2F46B3E25124E956E401AA4194066C01ADC9E633DD2BFE794C87
10F3B94766986465135B8B395F832166A17F9E7EDD8DCB0D19125307CC32B76B
7009113A1BD91C5A2815E0A5A533B8A6ABFC47F0D11A668A2791E9F2F6088A5D
Public Exponent 010001
Private Exponent 2329168FF34DD57A92AB55139AAAAC14CF6466F38FAFB1064786DDB900B1D723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 1 C68BEBAFB00F0A1B7150AB24BDFC6E9ACCB413951857EEF62EC81D78B7F4E432
CF653F969F81F6C26FB6ACC300302F583853C654B823E48EA617540F2EAE10A9
D46C005A539F270AFC86E8A1FDA9B66960B5C4B6D1746F5B616A6B90D8B1E822
C3AF0ED1097550D87B55C5B6651CBFE769A16051FAA4F416DEECBA79FD9252BC
D99694FEA3981A50E329ECB367988A5FAEEB7C81FDAD8276B11CFC3AD0A85E65
53AB5D661EFA4D26A30157BD9FEA3428EB452F20D33525B2A9151BF542885B38
BF2FDAFA3CD3C3B48754822A5EF648D91A4CB3F98BCD222CC1497CB530A91B29
F1C52ED3F3242E1D6AB0A790708A3CB96D6DD718A7F1B4579EE6D0941DC06CE5
Prime 2 DA8B67A93CB27D2F5B7D2F86454FD2A57D20258058B3AE74999665E03C8A95A4
739D338B1312AD7E39EDBECADB3151A5172D198ABA2D1D6C88DFBA3462D52805
ADCF44070423098B0DC7D12CC767109860B1D1674F37CA2A3E03A425A76ECAB5
2737392460DB0221E90E099F02623FC93631E34C146B8DBD7367C0365C329704
C6D2304E0B4A8519737162556E0D36952D24A830DC8BDB1EDE7062C0DA000C26
44653F9F6043452EC676F51E3CF8EC2AC4B9249630CE522E2E754D5A0629612D
5D7180EBA39802E9DA665C6EA661A8483AB688D5B525B2EB0521BFF5E37211FA
7E882FE3F2FA109CC53800A902296BA6E4C3CCDC84E8EBAAB9EB59A03CCFC819
Exponent 1 9D26A8D1319865D69CD54DF1521358F45BEC78C77D3234A95513FE07CC0B2108
7A91D847FF4EDE22BE4BA7E8DCE046C91C246B0A2989F7615563879C50C563D9
1892B7A0C72964BCD46E6FF9B00EC19C1CF9228FD5AFC4685EEDDDE0133495D9
D66B5C5DE68F9E030B74337F0FFF36821360B11D923738205628A7DCE0F10D5D
FF17AA2CF70DF05E6FBF8263EA2E99EFEC42E614F9D6793A3B2C0715028D11D2
3FEC968BBB1F412BC0BFD253FC1C6356B409D9A8B0A413879B3F6316B8A7B714
6E77916A99F4BFA5C7AC032F4864C5FA594FB6F0615067A96700249E41BAC80E
66183DDD734902DB33D4497D1126C9B3B742C68AF47B62D42BA8E415288B6365
Exponent 2 483FC1FB5F079AFF26FDD1D24FE3BDBDDC09DE9BF9B71D3B8AF2FFA70C1CBCAF
EB50D3136D30C58E6F543BB91091D36E02A574463A9A6399D7FE2EAED6E5A51F
8B8073FAE5D1377C7307D60D39B6C6F3B933D0089955D64DF4C67B63BF608F3F
2841C770515CD5EDA4007209D15DEDBC756034C698119E803D40D578A32E4E62
D3DFF4FC381B60B933430EC1336AC6DAB65BE2069542DF23EB61B8240D6DEA96
54122CE061909BB485041AB0EE735490270D161D58F13C95EBE1F7BA8542F4CF
6C8EF391F33973ED1FB8AB62213B33C8FD300F38A774591BFD4C550BD32F88E6
0922B8C261376E7A8570A8373771BE172495DE8A209E681ABEF0216729F37F31
Coefficient 6978A387C201384A23F0E0BCD73737787364460ACF34F2B103AE60181A3E2DAF
D4F26B819F4B1ED7CD9E8CF225922365ACFB408ACC2E87207E339CF72059B94B
09552BFFAED96E486CE29AABDC8B95DA948B19F26CE702FD4D40867B50F5CFF5
7361BD181A7B4AFF4D80C547A5CBF9D2D51E9A1D1C729FF12E84129DCB132DC9
DCEE79F45456A05F232E1B3C31CA02D56EBDBC031C81A85DDE3CA2A5E4CD2F5B
C7D6394AA7F20022B74ED11A730C8C7024053C36500658D10C0622668C41E627
AF714A6EB76BCDC0B888F8AB4046DC5F158D08A5D7F388C76C7F022CE1834FDE
2B443126A9209274DED029D7D4FF7AC4B5AB0C88E8DEFD592D440AE254FBB422
2855
2856
2906
2907 Once unnecessary spaces and carriage returns are removed, ManagementPlanReplacement is:
2908
2909 0000 3C 4D 67 6D 74 50 6C 61 6E 3E 3C 50 4F 49 49 64 |<MgmtPlan><POIId|
2910 0010 3E 3C 49 64 3E 36 36 30 30 30 30 30 31 3C 2F 49 |><Id>66000001</I|
2911 0020 64 3E 3C 54 70 3E 4F 50 4F 49 3C 2F 54 70 3E 3C |d><Tp>OPOI</Tp><|
2912 0030 49 73 73 72 3E 54 4D 47 54 3C 2F 49 73 73 72 3E |Issr>TMGT</Issr>|
2913 0040 3C 2F 50 4F 49 49 64 3E 3C 54 65 72 6D 6E 6C 4D |</POIId><TermnlM|
2914 0050 67 72 49 64 3E 3C 49 64 3E 65 70 61 73 2D 61 63 |grId><Id>epas-ac|
2915 0060 71 75 69 72 65 72 2D 54 4D 31 3C 2F 49 64 3E 3C |quirer-TM1</Id><|
2916 0070 54 70 3E 54 4D 47 54 3C 2F 54 70 3E 3C 2F 54 65 |Tp>TMGT</Tp></Te|
2917 0080 72 6D 6E 6C 4D 67 72 49 64 3E 3C 44 61 74 61 53 |rmnlMgrId><DataS|
2918 0090 65 74 3E 3C 49 64 3E 3C 54 70 3E 41 51 50 52 3C |et><Id><Tp>AQPR<|
2919 00A0 2F 54 70 3E 3C 43 72 65 44 74 54 6D 3E 32 30 31 |/Tp><CreDtTm>201|
2920 00B0 33 2D 30 34 2D 31 38 54 31 30 3A 35 32 3A 32 37 |3-04-18T10:52:27|
2921 00C0 2E 39 35 2B 30 32 3A 30 30 3C 2F 43 72 65 44 74 |.95+02:00</CreDt|
2922 00D0 54 6D 3E 3C 2F 49 64 3E 3C 43 6E 74 74 3E 3C 41 |Tm></Id><Cntt><A|
2923 00E0 63 74 6E 3E 3C 54 70 3E 44 57 4E 4C 3C 2F 54 70 |ctn><Tp>DWNL</Tp|
2924 00F0 3E 3C 41 64 72 3E 3C 50 6D 72 79 41 64 72 3E 54 |><Adr><PmryAdr>T|
2925 0100 4D 31 2E 54 65 73 74 2E 45 50 41 53 4F 72 67 2E |M1.Test.EPASOrg.|
2926 0110 65 75 3C 2F 50 6D 72 79 41 64 72 3E 3C 50 6D 72 |eu</PmryAdr><Pmr|
2927 0120 79 50 6F 72 74 4E 62 3E 35 30 30 31 3C 2F 50 6D |yPortNb>5001</Pm|
2928 0130 72 79 50 6F 72 74 4E 62 3E 3C 2F 41 64 72 3E 3C |ryPortNb></Adr><|
2929 0140 44 61 74 61 53 65 74 49 64 3E 3C 54 70 3E 4D 47 |DataSetId><Tp>MG|
2930 0150 54 50 3C 2F 54 70 3E 3C 2F 44 61 74 61 53 65 74 |TP</Tp></DataSet|
2931 0160 49 64 3E 3C 54 72 67 67 72 3E 44 41 54 45 3C 2F |Id><Trggr>DATE</|
2932 0170 54 72 67 67 72 3E 3C 54 6D 43 6F 6E 64 3E 3C 53 |Trggr><TmCond><S|
2933 0180 74 61 72 74 54 6D 3E 32 30 31 33 2D 30 34 2D 32 |tartTm>2013-04-2|
2934 0190 34 54 32 32 3A 34 35 3A 30 30 3C 2F 53 74 61 72 |4T22:45:00</Star|
2935 01A0 74 54 6D 3E 3C 50 72 64 3E 31 30 30 30 30 3C 2F |tTm><Prd>10000</|
2936 01B0 50 72 64 3E 3C 52 65 54 72 79 3E 3C 44 65 6C 79 |Prd><ReTry><Dely|
2937 01C0 3E 31 30 3C 2F 44 65 6C 79 3E 3C 4D 61 78 4E 62 |>10</Dely><MaxNb|
2938 01D0 3E 32 3C 2F 4D 61 78 4E 62 3E 3C 2F 52 65 54 72 |>2</MaxNb></ReTr|
2939 01E0 79 3E 3C 2F 54 6D 43 6F 6E 64 3E 3C 2F 41 63 74 |y></TmCond></Act|
2940 01F0 6E 3E 3C 2F 43 6E 74 74 3E 3C 2F 44 61 74 61 53 |n></Cntt></DataS|
2941 0200 65 74 3E 3C 2F 4D 67 6D 74 50 6C 61 6E 3E |et></MgmtPlan> |
2942
2943
2944
2950
2951 Applying the padding process, the block result is dumped below:
2952 0000 00 01 FF FF FF FF FF FF FF FF FF FF FF FF FF FF |................|
2953 0010 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF |................|
2954 0020 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF |................|
2955 0030 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF |................|
2956 0040 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF |................|
2957 0050 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF |................|
2958 0060 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF |................|
2959 0070 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF |................|
2960 0080 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF |................|
2961 0090 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF |................|
2962 00A0 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF |................|
2963 00B0 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF |................|
2964 00C0 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF |................|
2965 00D0 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF |................|
2966 00E0 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF |................|
2967 00F0 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF |................|
2968 0100 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF |................|
2969 0110 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF |................|
2970 0120 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF |................|
2971 0130 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF |................|
2972 0140 FF FF FF FF FF FF FF FF FF FF FF FF 00 30 31 30 |.............010|
2973 0150 0D 06 09 60 86 48 01 65 03 04 02 01 05 00 04 20 |...`.H.e....... |
2974 0160 C3 61 49 C6 87 19 B1 CC 56 8E 25 69 26 ED 8D 81 |.aI.....V.%i&...|
2975 0170 CE 66 90 6B 44 BE 43 9D BA 97 3B 63 8E 6D 45 35 |.f.kD.C...;c.mE5|
2976
2977 After encryption by the RSA signing private key, we have the digital signature of the
2978 ManagementPlanReplacement message body:
2979 0000 A7 86 B8 7F 27 5D 3C 75 C1 C4 FF 76 C4 63 70 5D | ']<u v cp]|
2980 0010 17 BD 77 1A 1A AB 95 95 7A 87 41 6C 0F 2B 91 34 | w z Al + 4|
2981 0020 3D 8C CF E7 C6 2C E2 E0 0F 9E 75 B2 F1 8D 7F 1A |= , u |
2982 0030 7D 16 46 E0 44 16 E2 C9 9C C5 3B 0D 0C 37 E4 0D |} F D ; 7 |
2983 0040 D0 53 36 42 77 65 8F 82 C3 DA 93 7D 4F 6E 51 36 | S6Bwe }OnQ6|
2984 0050 A7 F0 2F 1B E1 54 B1 9C 60 19 96 83 0C A7 C6 B2 | / T ` |
2985 0060 EA 1A DF 5F 69 21 A2 B5 96 AC 90 D0 FB DC 04 EF | _i! |
2986 0070 24 C2 C8 AA CE B9 66 78 AF 3A E8 A8 1A F9 0F 04 |$ fx : |
2987 0080 DE 7D 00 CA 0A 20 06 55 19 5A 48 78 74 8A 89 B4 | } U ZHxt |
2988 0090 1F 74 86 8D F1 EF 8E F9 0A 3E 89 26 45 F1 D4 F0 | t > &E |
2989 00A0 46 91 E9 C4 65 40 28 8B 2A 29 4C F2 39 65 20 61 |F e@( *)L 9e a|
2990 00B0 29 26 09 67 E4 41 65 B8 81 30 65 AC 18 38 12 01 |)& g Ae 0e 8 |
2991 00C0 4E 13 BB BE 8E F9 5D 34 12 43 70 7E F3 76 28 C7 |N ]4 Cp~ v( |
2992 00D0 84 CD C0 F2 1C F5 CB 29 B9 C4 89 B3 CC 98 5B 25 | ) [%|
2993 00E0 D2 7C DB 5C 95 A8 27 FD E5 A5 DA 20 70 4E 04 C1 | | \ ' pN |
2994 00F0 70 66 45 01 31 9C C2 C4 44 D0 F8 9E 8C 7C F8 96 |pfE 1 D | |
2995 0100 EE D1 5F 5B C8 35 ED 3A 9F B8 F3 73 9D 96 1B F8 | _[ 5 : s |
2996 0110 28 CE BF EA F1 BD 40 95 D0 F5 F7 00 B7 6F 68 1A |( @ oh |
2997 0120 D7 A3 C6 46 76 9F 61 15 A1 6F 4C F1 B7 7B 2A BA | Fv a oL {* |
2998 0130 EB 49 BB 0C 0D A1 EB 0F 48 C3 32 05 F4 97 95 FC | I H 2 |
2999 0140 9E 74 6C 72 44 C4 1F 01 9D F3 B2 C0 7F EF 19 21 | tlrD !|
3000 0150 BE A1 4C 81 6C 6A 55 A0 F4 C6 1F 0B DA 83 3D 01 | L ljU = |
3001 0160 8D 54 36 08 74 CF 1C 1D 32 7C 33 18 31 19 4D 4D | T6 t 2|3 1 MM|
3002 0170 82 83 AF 9A 2B AC 1E 63 ED 48 03 0B 32 4D 10 CB | + c H 2M |
3003
3004
3005
3006 Inside the SecurityTrailer, the SignedData CMS data structure is presented in the table below:
Message Item Value
SecurityTrailer
SignedData
ContentType SignedData
DigestAlgorithm
Algorithm SHA256
EncapsulatedContent
ContentType PlainData
Certificate 308204FF308202E7A003020102020A2ABC40F4D482F5EBC975300D06092A8648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Signer
SignerIdentification
IssuerAnd-
SerialNumber
Issuer
RelativeDistin-
guishedName
AttributeType CountryName
AttributeValue BE
RelativeDistin-
guishedName
AttributeType OrganisationName
AttributeValue EPASOrg
RelativeDistin-
guishedName
AttributeType OrganisationUnitName
AttributeValue Technical Center of Expertise
RelativeDistin-
guishedName
AttributeType CommonName
AttributeValue EPAS Protocols Test CA
SerialNumber 2ABC40F4D482F5EBC975
DigestAlgorithm
Algorithm SHA256
SignatureAlgorithm
Algorithm SHA256WithRSA
Signature A786B87F275D3C75C1C4FF76C463705D17BD771A1AAB95957A87416C0F2B9134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3008
3009 The XML encoded structure of the digital signature in the SecurityTrailer with the certificate of the
3010 signer is:
3011 <SctyTrlr>
3012 <CnttTp>SIGN</CnttTp>
3013 <SgndData>
3014 <DgstAlgo>
3015 <Algo>HS25</Algo>
3016 </DgstAlgo>
3017 <NcpsltdCntt>
3018 <CnttTp>DATA</CnttTp>
3019 </NcpsltdCntt>
3020 <Cert>
3021 MIIE/zCCAuegAwIBAgIKKrxA9NSC9evJdTANBgkqhkiG9w0BAQsFADBoMQswCQYDVQQGDAJCRTEQMA
3022 4GA1UECgwHRVBBU09yZzEmMCQGA1UECwwdVGVjaG5pY2FsIENlbnRlciBvZiBFeHBlcnRpc2UxHzAd
3023 BgNVBAMMFkVQQVMgUHJvdG9jb2xzIFRlc3QgQ0EwKhgTMjAxMzA0MTgxMDA2NDYrMDEwMBgTMjAxOD
3024 EwMDExODIwMDUrMDEwMDB4MQswCQYDVQQGDAJGUjEQMA4GA1UECgwHRVBBU09yZzEmMCQGA1UECwwd
3025 VGVjaG5pY2FsIENlbnRlciBvZiBFeHBlcnRpc2UxLzAtBgNVBAMMJkVQQVMgUHJvdG9jb2wgVGVzdC
3026 BIb3N0IEF1dGhlbnRpY2F0aW9uMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvQlYmPmB
3027 uvQr4g4ZM5s5bFliZpC985bSDFA8pXxoivQeUFUs8bndxBFiCd0AwmtnP37e59DKbcLaqf8vjDqGC4
3028 +DWuYNngV+3fFiX6xVoQKDf8HH74wKbBN8WXOXKrxA9NSC9evJdU+WS27s7b5m22KtDaezjgWRdWLo
3029 md9xfSdFdpO0Hnvyy6mIVa4sl95LSP2BKlINbTVgEPboNV7JjbowR/LAzc2b5lUnfz7WmniN2ApqEr
3030 yj1MfwhmK5nT9wqVSNeAS15KKROj7AJSW+Y57X2bmGVWxZMmdWQvzE5lnYKKlMVUSuu8VEbua5agSg
3031 GFRwKW38L/unPUB0kwlo3YEOQ9V03XvmZImdpuSOtLO1kOLKqXx1AVxzUJOtYuP9eRq1cY8foZZz66
3032 96vzzNcy8x05f855CGnSpoLfIyRRQYHM4c2056QDbausJidu4KOi0r4E+1LlgSj/QIbHQXzeznWxh4
3033 PfosBdSlGJkwf9zEoAcBMA1ztF/9UuOWdYzFAgMBAAGjDzANMAsGA1UdDwQEAwIHgDANBgkqhkiG9w
3034 0BAQsFAAOCAgEAdgStiWVUuNceBwdpcOFMP0LmY4t1jlDDBcPh3Yq8PsoCFQr1EB02gUY4FQ5Ppz5d
3035 kuV5mDtJi9op++nOFKeT8S9fsIlhtz3ByD+zdGeyxbr/9hz2G3k2OOoh40GLyrXHHrogJSMM7PaguY
3036 kwE/f1tOZkGaYEVcyQxf71lrdvqRTzWt/giOFSWzThw/EZK/gdWf9n8xGh9+YU6TMvnGzqDdufDA7r
3037 VwisLbIPAX8GB5obfAMlTyW7oT4hQYWgVnqsciADUEiIq0qfWs/Qw6zU1MPDp12DC5axeSB33W/wDG
3038 /aU8yx+mov8chW93mL+DEy9iOED7IS5xDG/lBaxkU4A4Pl66fszwjiJiLM2HSN0EzW7No1CNg6Teup
3039 bQUj24dkOV7atZpCQheAW9jXFfQB1UQnJ7BtB8vC1gXgyk5H91J6PjAOppZ163dxRZiXGyZT3QtzQE
3040 M2X6+kWQkxSoX/tGujT4iyKOmdU3OdPwDnjTzq3uc22q4RXOUKwQ6/sKxYcSRLugcRBxseQPocxg4S
3041 WNbUl4j3I7FOBPSNWImCYcNzmLVRDcR/XF7219J7DIDyh28rAlcci6zikXQiG9y1ZHBCtLZ999Ex6T
3042 JGcMtk0uGxWXfWUfykj+9ijqKxN6kjb+t8NOGdj99DfIQIpWzgYrLMQ12F7GWiXYtBtRIGfKs=
3043 </Cert>
3044 <Sgnr>
3045 <SgnrId>
3046 <IssrAndSrlNb>
3047 <RltvDstngshdNm>
3048 <AttrTp>CATT</AttrTp>
3049 <AttrVal>BE</AttrVal>
3050 </RltvDstngshdNm>
3051 <RltvDstngshdNm>
3052 <AttrTp>OATT</AttrTp>
3053 <AttrVal>EPASOrg</AttrVal>
3054 </RltvDstngshdNm>
3055 <RltvDstngshdNm>
3056 <AttrTp>OUAT</AttrTp>
3057 <AttrVal>Technical Center of Expertise</AttrVal>
3058 </RltvDstngshdNm>
3059 <RltvDstngshdNm>
3060 <AttrTp>CNAT</AttrTp>
3061 <AttrVal>EPAS Protocols Test CA</AttrVal>
3062 </RltvDstngshdNm>
3063 <SrlNb>KrxA9NSC9evJdQ==</SrlNb>
3064 </IssrAndSrlNb>
3065 <DgstAlgo>
3066 <Algo>HS25</Algo>
3067 </DgstAlgo>
3068 <SgntrAlgo>
3069 <Algo>ERS2</Algo>
3070 </SgntrAlgo>
3071 <Sgntr>
3072 p4a4fyddPHXBxP92xGNwXRe9dxoaq5WVeodBbA8rkTQ9jM/nxizi4A+edbLxjX8afRZG4EQW4s
3073 mcxTsNDDfkDdBTNkJ3ZY+Cw9qTfU9uUTan8C8b4VSxnGAZloMMp8ay6hrfX2khorWWrJDQ+9wE
3074 7yTCyKrOuWZ4rzroqBr5DwTefQDKCiAGVRlaSHh0iom0H3SGjfHvjvkKPokmRfHU8EaR6cRlQC
3075 iLKilM8jllIGEpJgln5EFluIEwZawYOBIBThO7vo75XTQSQ3B+83Yox4TNwPIc9cspucSJs8yY
3076 WyXSfNtclagn/eWl2iBwTgTBcGZFATGcwsRE0PiejHz4lu7RX1vINe06n7jzc52WG/gozr/q8b
3077 1AldD19wC3b2ga16PGRnafYRWhb0zxt3squutJuwwNoesPSMMyBfSXlfyedGxyRMQfAZ3zssB/
3078 7xkhvqFMgWxqVaD0xh8L2oM9AY1UNgh0zxwdMnwzGDEZTU2Cg6+aK6weY+1IAwsyTRDL
3079 </Sgntr>
3080 </SgnrId>
3081 </Sgnr>
3082 </SgndData>
3083 </SctyTrlr>
3084
3085
3086 Once unnecessary spaces and carriage returns are removed, SecurityTrailer structure is:
3087 0000 3C 53 63 74 79 54 72 6C 72 3E 3C 43 6E 74 74 54 |<SctyTrlr><CnttT|
3088 0010 70 3E 53 49 47 4E 3C 2F 43 6E 74 74 54 70 3E 3C |p>SIGN</CnttTp><|
3089 0020 53 67 6E 64 44 61 74 61 3E 3C 44 67 73 74 41 6C |SgndData><DgstAl|
3090 0030 67 6F 3E 3C 41 6C 67 6F 3E 48 53 32 35 3C 2F 41 |go><Algo>HS25</A|
3091 0040 6C 67 6F 3E 3C 2F 44 67 73 74 41 6C 67 6F 3E 3C |lgo></DgstAlgo><|
3092 0050 4E 63 70 73 6C 74 64 43 6E 74 74 3E 3C 43 6E 74 |NcpsltdCntt><Cnt|
3093 0060 74 54 70 3E 44 41 54 41 3C 2F 43 6E 74 74 54 70 |tTp>DATA</CnttTp|
3094 0070 3E 3C 2F 4E 63 70 73 6C 74 64 43 6E 74 74 3E 3C |></NcpsltdCntt><|
3095 0080 43 65 72 74 3E 4D 49 49 45 2F 7A 43 43 41 75 65 |Cert>MIIE/zCCAue|
3096 0090 67 41 77 49 42 41 67 49 4B 4B 72 78 41 39 4E 53 |gAwIBAgIKKrxA9NS|
3097 00A0 43 39 65 76 4A 64 54 41 4E 42 67 6B 71 68 6B 69 |C9evJdTANBgkqhki|
3098 00B0 47 39 77 30 42 41 51 73 46 41 44 42 6F 4D 51 73 |G9w0BAQsFADBoMQs|
3099 00C0 77 43 51 59 44 56 51 51 47 44 41 4A 43 52 54 45 |wCQYDVQQGDAJCRTE|
3100 00D0 51 4D 41 34 47 41 31 55 45 43 67 77 48 52 56 42 |QMA4GA1UECgwHRVB|
3101 00E0 42 55 30 39 79 5A 7A 45 6D 4D 43 51 47 41 31 55 |BU09yZzEmMCQGA1U|
3102 00F0 45 43 77 77 64 56 47 56 6A 61 47 35 70 59 32 46 |ECwwdVGVjaG5pY2F|
3103 0100 73 49 45 4E 6C 62 6E 52 6C 63 69 42 76 5A 69 42 |sIENlbnRlciBvZiB|
3104 0110 46 65 48 42 6C 63 6E 52 70 63 32 55 78 48 7A 41 |FeHBlcnRpc2UxHzA|
3105 0120 64 42 67 4E 56 42 41 4D 4D 46 6B 56 51 51 56 4D |dBgNVBAMMFkVQQVM|
3106 0130 67 55 48 4A 76 64 47 39 6A 62 32 78 7A 49 46 52 |gUHJvdG9jb2xzIFR|
3107 0140 6C 63 33 51 67 51 30 45 77 4B 68 67 54 4D 6A 41 |lc3QgQ0EwKhgTMjA|
3108 0150 78 4D 7A 41 30 4D 54 67 78 4D 44 41 32 4E 44 59 |xMzA0MTgxMDA2NDY|
3109 0160 72 4D 44 45 77 4D 42 67 54 4D 6A 41 78 4F 44 45 |rMDEwMBgTMjAxODE|
3110 0170 77 4D 44 45 78 4F 44 49 77 4D 44 55 72 4D 44 45 |wMDExODIwMDUrMDE|
3111 0180 77 4D 44 42 34 4D 51 73 77 43 51 59 44 56 51 51 |wMDB4MQswCQYDVQQ|
3112 0190 47 44 41 4A 47 55 6A 45 51 4D 41 34 47 41 31 55 |GDAJGUjEQMA4GA1U|
3113 01A0 45 43 67 77 48 52 56 42 42 55 30 39 79 5A 7A 45 |ECgwHRVBBU09yZzE|
3114 01B0 6D 4D 43 51 47 41 31 55 45 43 77 77 64 56 47 56 |mMCQGA1UECwwdVGV|
3115 01C0 6A 61 47 35 70 59 32 46 73 49 45 4E 6C 62 6E 52 |jaG5pY2FsIENlbnR|
3116 01D0 6C 63 69 42 76 5A 69 42 46 65 48 42 6C 63 6E 52 |lciBvZiBFeHBlcnR|
3117 01E0 70 63 32 55 78 4C 7A 41 74 42 67 4E 56 42 41 4D |pc2UxLzAtBgNVBAM|
3118 01F0 4D 4A 6B 56 51 51 56 4D 67 55 48 4A 76 64 47 39 |MJkVQQVMgUHJvdG9|
3119 0200 6A 62 32 77 67 56 47 56 7A 64 43 42 49 62 33 4E |jb2wgVGVzdCBIb3N|
3120 0210 30 49 45 46 31 64 47 68 6C 62 6E 52 70 59 32 46 |0IEF1dGhlbnRpY2F|
3121 0220 30 61 57 39 75 4D 49 49 42 6F 6A 41 4E 42 67 6B |0aW9uMIIBojANBgk|
3122 0230 71 68 6B 69 47 39 77 30 42 41 51 45 46 41 41 4F |qhkiG9w0BAQEFAAO|
3123 0240 43 41 59 38 41 4D 49 49 42 69 67 4B 43 41 59 45 |CAY8AMIIBigKCAYE|
3124 0250 41 76 51 6C 59 6D 50 6D 42 75 76 51 72 34 67 34 |AvQlYmPmBuvQr4g4|
3125 0260 5A 4D 35 73 35 62 46 6C 69 5A 70 43 39 38 35 62 |ZM5s5bFliZpC985b|
3126 0270 53 44 46 41 38 70 58 78 6F 69 76 51 65 55 46 55 |SDFA8pXxoivQeUFU|
3127 0280 73 38 62 6E 64 78 42 46 69 43 64 30 41 77 6D 74 |s8bndxBFiCd0Awmt|
3128 0290 6E 50 33 37 65 35 39 44 4B 62 63 4C 61 71 66 38 |nP37e59DKbcLaqf8|
3129 02A0 76 6A 44 71 47 43 34 2B 44 57 75 59 4E 6E 67 56 |vjDqGC4+DWuYNngV|
3130 02B0 2B 33 66 46 69 58 36 78 56 6F 51 4B 44 66 38 48 |+3fFiX6xVoQKDf8H|
3131 02C0 48 37 34 77 4B 62 42 4E 38 57 58 4F 58 4B 72 78 |H74wKbBN8WXOXKrx|
3132 02D0 41 39 4E 53 43 39 65 76 4A 64 55 2B 57 53 32 37 |A9NSC9evJdU+WS27|
3133 02E0 73 37 62 35 6D 32 32 4B 74 44 61 65 7A 6A 67 57 |s7b5m22KtDaezjgW|
3134 02F0 52 64 57 4C 6F 6D 64 39 78 66 53 64 46 64 70 4F |RdWLomd9xfSdFdpO|
3135 0300 30 48 6E 76 79 79 36 6D 49 56 61 34 73 6C 39 35 |0Hnvyy6mIVa4sl95|
3136 0310 4C 53 50 32 42 4B 6C 49 4E 62 54 56 67 45 50 62 |LSP2BKlINbTVgEPb|
3137 0320 6F 4E 56 37 4A 6A 62 6F 77 52 2F 4C 41 7A 63 32 |oNV7JjbowR/LAzc2|
3138 0330 62 35 6C 55 6E 66 7A 37 57 6D 6E 69 4E 32 41 70 |b5lUnfz7WmniN2Ap|
3139 0340 71 45 72 79 6A 31 4D 66 77 68 6D 4B 35 6E 54 39 |qEryj1MfwhmK5nT9|
3140 0350 77 71 56 53 4E 65 41 53 31 35 4B 4B 52 4F 6A 37 |wqVSNeAS15KKROj7|
3141 0360 41 4A 53 57 2B 59 35 37 58 32 62 6D 47 56 57 78 |AJSW+Y57X2bmGVWx|
3142 0370 5A 4D 6D 64 57 51 76 7A 45 35 6C 6E 59 4B 4B 6C |ZMmdWQvzE5lnYKKl|
3143 0380 4D 56 55 53 75 75 38 56 45 62 75 61 35 61 67 53 |MVUSuu8VEbua5agS|
3144 0390 67 47 46 52 77 4B 57 33 38 4C 2F 75 6E 50 55 42 |gGFRwKW38L/unPUB|
3145 03A0 30 6B 77 6C 6F 33 59 45 4F 51 39 56 30 33 58 76 |0kwlo3YEOQ9V03Xv|
3146 03B0 6D 5A 49 6D 64 70 75 53 4F 74 4C 4F 31 6B 4F 4C |mZImdpuSOtLO1kOL|
3147 03C0 4B 71 58 78 31 41 56 78 7A 55 4A 4F 74 59 75 50 |KqXx1AVxzUJOtYuP|
3148 03D0 39 65 52 71 31 63 59 38 66 6F 5A 5A 7A 36 36 39 |9eRq1cY8foZZz669|
3149 03E0 36 76 7A 7A 4E 63 79 38 78 30 35 66 38 35 35 43 |6vzzNcy8x05f855C|
3150 03F0 47 6E 53 70 6F 4C 66 49 79 52 52 51 59 48 4D 34 |GnSpoLfIyRRQYHM4|
3151 0400 63 32 30 35 36 51 44 62 61 75 73 4A 69 64 75 34 |c2056QDbausJidu4|
3152 0410 4B 4F 69 30 72 34 45 2B 31 4C 6C 67 53 6A 2F 51 |KOi0r4E+1LlgSj/Q|
3271
3289
3290