Shopping Cart

No products in the cart.

BSI 14/30276451 DC:2014 Edition

$13.70

BS ISO/IEC 29167-16. Information technology. Automatic identification and data capture techniques. Part 16. Air interface for security services crypto suite ECDSA-ECDH

Published By Publication Date Number of Pages
BSI 2014 38
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
6 Foreword
 Part 1: Air Interface for security services and file management for RFID architecture
 Part 10: Air Interface for security services crypto suite AES128
 Part 11: Air Interface for security services crypto suite PRESENT-80
 Part 12: Air Interface for security services crypto suite ECC-DH
 Part 13: Air Interface for security services crypto suite Grain-128A
 Part 14: Air Interface for security services crypto suite AES-OFB
 Part 15: Air Interface for security services crypto suite XOR
 Part 16: Air Interface for security services crypto suite ECDSA-ECDH
 Part 17: Air Interface for security services crypto suite Crypto GPS
 Part 19: Air Interface for security services crypto suite RAMON
7 Introduction
9 1 Scope
2 Conformance
2.1 Claiming conformance
2.2 Interrogator conformance and obligations
2.3 Tag conformance and obligations
10 3 Normative references
4 Terms and definitions
4.1 Terms and definitions
4.1.1
Command (Message)
Command that Interrogator sends to Tag with “Message” as parameter
11 4.1.2
Message
Part of the Command that is defined by the CS
4.1.3
Reply (Response)
Reply that Tag returns to the Interrogator with “Response” as parameter
4.1.4
Response
Part of the Reply (stored or sent) that is defined by the CS
4.2 Symbols
4.3 Abbreviated terms
12 5 Cipher introduction
6 Parameter definitions
13 7 State diagram
14 Figure 1 — State diagram
8 Authentication
Figure 2 — Mutual authentication with key agreement
Figure 3 — Protocol flows between TTP and interrogator
8.1 Command
8.1.1 Authenticate command
15 8.1.2 Authenticate(MAM1.1 Message)
16 8.1.3 MAM1.1 Response
8.1.4 Authenticate(MAM1.2 Message)
17 8.1.5 MAM1.2 Response
18 8.1.6 Authenticate_EX
8.1.7 Authenticate_EX Response
19 8.2 Authentication procedure
8.2.1 Protocol requirements
8.2.2 Procedure
21 a) When the interrogator received the MAM 1.1 Response (the optional field TTPID presents), it should send the Authenticate_EX command to the TTP, including the information of TID,IID,TTPID,RNt and RNi.
b) After receiving the Authenticate_EX command, the TTP shall verify the tag and interrogator certificate (See IETF RFC 3280 for the certificates status verification) and send the Authenticate_EX Response to the interrogator,including the information…
c) When the interrogator received the Authenticate_EX Response from the TTP, it should check the tag validity by RNt, TID and the authentication results of the tag RESt. If the verification is failed, ignore the response and the authentication proced…
d) After receiving the Authenticate(MAM 1.2 Message), the tag should check the interrogator validity by RNi, IID and the authentication results of the interrogator RESi. If the verification is failed, ignore the response and the authentication procedu…
9 Authenticate Communication
Figure 4 – Authenticate communication
22 10 Secure Communication
Figure 5 – Secure communication
23 Annex A (normative) State transition table
A.1 Ready state transition table
Table A.1 — Ready state transition table
A.2 Authenticate state transition table
Table A.2 — Authenticate state transition table
A.3 AuthComm state transition table
Table A.3 — AuthComm state transition table
A.4 SecureComm state transition table
Table A.4 — SecureComm state transition table
24 Annex B (normative) Error codes and error handling
B.1 Error code format
Table B.1 — Error code format
B.2 Error type and error subcode
Table B.2 — Error type and error subcode
25 Annex C (normative) Cipher description
26 Annex D (informative) Test Vectors
D.1 Authentication Elliptic E curve
D.2 Authentication Parameters
27 D.3 Authentication Process
29 D.4 Authenticate EX Command
31 Annex E (normative) Protocol specific
E.1 Protocol Specific Operation
E.2 ISO/IEC 18000-4 Mode 3
E.2.1 General
E.2.2 Authenticate command
Table E.1 — Payload
Table E.2 — Data
Table E.3 — Payload
32 Table E.4 — Data
Table E.5 — MAM1.1 Message
Table E.6 — MAM1.1 Response format
Table E.7 — MAM1.2 Message
33 Table E.8 — MAM1.1 Response format
E.2.3 AuthComm command
Table E.9 — Payload
Table E.10 — Data
34 Table E.11 — Payload
Table E.12 — Data
E.2.4 SecureComm command
Table E.13 — Payload
Table E.14 — Data
35 Table E.15 — Payload
Table E.16 — Data
36 Annex F (normative) Protocol message’s fragmentation and defragmentation
37 Annex G (informative) Examples of ECC parameters
G.1 Principle
G.2 ECC parameters used in the authentication mechanism
BSI 14/30276451 DC
$13.70