Professional Documents
Culture Documents
0 (2022-02)
Annex M (informative):
Examples of ODD AUTHENTICATE instruction code usage
The presence of components enclosed in {…} depends on the case of the APDU.
The terminal sends some data in the object with tag '53' and the answer received by the UICC is in the object with tag
'53'. The security context used in the example is P2='00'. The challenge data is [xx … xx] and the authentication
response data is [yy … yy].
In the first example the length of the challenge data is 200 bytes ('C8' hex) and the length of the response data is
100 bytes ('64' hex).
Terminal UICC
AUTHENTICATE 00 89 A0 00 Le=00
(First Block of
authentication
response data)
[53 64 yy ... yy] 90 00
In the second example the length of the challenge data is 700 bytes ('02BC' hex) and the length of the response data is
600 bytes ('0258' hex).
ETSI
186 ETSI TS 102 221 V17.1.0 (2022-02)
Terminal UICC
The presence of components enclosed in {…} depends on the case of the APDU or the type of the TPDU.
This clause gives examples of the usage of the ODD AUTHENTICATE command usage with transport protocol T = 0.
The first example is based on the preconditions out of table M.1.1. The second example is based on the preconditions
out of table M.1.2.
ETSI
187 ETSI TS 102 221 V17.1.0 (2022-02)
Terminal UICC
AUTHENTICATE 00 89 A0 00 Le=00
(First Block of
authentication
response data)
C-APDU:
C-TPDU: [00 89 A0 00 00]
6C 66 (SW1/2: '66 bytes available')
[00 89 A0 00 66]
[53 64 yy ... yy] 90 00
R-APDU: [53 64 yy ... yy] [90 00]
ETSI