ISO/IEC 7816-4
Identification cards — Integrated circuit cards — Part 4: Organization, security and commands for interchange
Cartes d’identification — Cartes à circuit intégré — Partie 4: Organisation, sécurité et commandes pour les échanges

In any control reference template, a key usage template (tag ‘A3′) may associate a file and key reference with a key usage counter and / or a key retry counter (see Table 34).
Table 34 — Key usage data objects

ISO MIFARE DESFire EV1 Smart Card 4k byte/32k bit,ISO 14443 A Mifare DESFire EV1 4K Cards,Mifare DESFire 4K Card,Mifare DESFire 4K Card,

In any control reference template for authentication (AT), for key agreement (KAT), for cryptographic checksum (CCT), for confidentiality (CT) or for digital signature (DST), a usage qualifier byte (tag ’95′) may specify the usage of the template either as a security condition (see 5.4.3.2 and Table 23), or in compliance with the MANAGE SECURITY ENVIRONMENT command (see 7.5.11). Table 35 shows the usage qualifier byte.

Table 35 Usage qualifier byte
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
1 - - - - - - - Verification (DST, CCT), Encipherment (CT), External authentication (AT), Key agreement (KAT)
- 1 - - - - - - Computation (DST, CCT), Decipherment (CT), Internal authentication (AT), Key agreement (KAT)
—- —- 1 — -1 – –1 - —1 —- —- Secure messaging in response data fields (CCT, CT, DST) Secure messaging in command data fields (CCT, CT, DST) User authentication, password based (AT) User authentication, biometry based (AT)
- - - - - - x x xxxx xx00 (any other value is reserved for future use)

In any control reference template for authentication (AT), for key agreement (KAT), for cryptographic checksum (CCT), for confidentiality (CT) or for digital signature (DST), a usage qualifier byte (tag ’95′) may specify the usage of the template either as a security condition (see 5.4.3.2 and Table 23), or in compliance with the MANAGE SECURITY ENVIRONMENT command (see 7.5.11). Table 35 shows the usage qualifier byte.

Table 36 Cryptogram descriptor byte
Value Meaning
’00′ No further indication
’1X’ ’2X’ ’3X’ ’4X’ One to four secret keys for enciphering information, not keys (‘X’ is a bitmap with any value from ’0′ to ‘F’) ’11′ indicates the first key (e.g., an “even”control word in a pay TV system) ’12′ indicates the second key (e.g., an “odd”control word in a pay TV system) ’13′ indicates the first key followed by the second key (e.g., a pair of control words in a pay TV system) Secret key for enciphering keys, not information (‘X’ is a reference with any value from ’0′ to ‘F’) (e.g., in a pay TV system, either an operational key for enciphering control words, or a management key for enciphering operational keys) Private key of an asymmetric key pair (‘X’ is a reference with any value from ’0′ to ‘F’) Password (‘X’ is a reference with any value from ’0′ to ‘F’)
’80′ to ‘FF’ Proprietary
Any other value is reserved for future use by ISO/IEC JTC 1/SC 17.