Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Chipset-ID and chipset master key pair         
 7     Key ladder 
        7.1     Overview       
        7.2     Key ladder computations        
        7.3     Usage rules information          
        7.4     Additional key layers 
        7.5     Associated data 2       
 8     Authentication mechanism
        8.1     Overview       
        8.2     Authentication mechanism computations       
 9     Data conversion primitives
        9.1     BS2OSP           
        9.2     OS2BSP           
        9.3     I2BSP
10     Cryptographic operations 
       10.1     Symmetric encryption scheme            
       10.2     Public-key encryption scheme             
       10.3     Digital signature scheme       
       10.4     Function h    
       10.5     Message authentication code algorithm          
Appendix I – Areas for further development    
Bibliography