BSI 14/30276451 DC:2014 Edition
$13.70
BS ISO/IEC 29167-16. Information technology. Automatic identification and data capture techniques. Part 16. Air interface for security services crypto suite ECDSA-ECDH
Published By | Publication Date | Number of Pages |
BSI | 2014 | 38 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
6 | Foreword Part 1: Air Interface for security services and file management for RFID architecture Part 10: Air Interface for security services crypto suite AES128 Part 11: Air Interface for security services crypto suite PRESENT-80 Part 12: Air Interface for security services crypto suite ECC-DH Part 13: Air Interface for security services crypto suite Grain-128A Part 14: Air Interface for security services crypto suite AES-OFB Part 15: Air Interface for security services crypto suite XOR Part 16: Air Interface for security services crypto suite ECDSA-ECDH Part 17: Air Interface for security services crypto suite Crypto GPS Part 19: Air Interface for security services crypto suite RAMON |
7 | Introduction |
9 | 1 Scope 2 Conformance 2.1 Claiming conformance 2.2 Interrogator conformance and obligations 2.3 Tag conformance and obligations |
10 | 3 Normative references 4 Terms and definitions 4.1 Terms and definitions 4.1.1 Command (Message) Command that Interrogator sends to Tag with “Message” as parameter |
11 | 4.1.2 Message Part of the Command that is defined by the CS 4.1.3 Reply (Response) Reply that Tag returns to the Interrogator with “Response” as parameter 4.1.4 Response Part of the Reply (stored or sent) that is defined by the CS 4.2 Symbols 4.3 Abbreviated terms |
12 | 5 Cipher introduction 6 Parameter definitions |
13 | 7 State diagram |
14 | Figure 1 — State diagram 8 Authentication Figure 2 — Mutual authentication with key agreement Figure 3 — Protocol flows between TTP and interrogator 8.1 Command 8.1.1 Authenticate command |
15 | 8.1.2 Authenticate(MAM1.1 Message) |
16 | 8.1.3 MAM1.1 Response 8.1.4 Authenticate(MAM1.2 Message) |
17 | 8.1.5 MAM1.2 Response |
18 | 8.1.6 Authenticate_EX 8.1.7 Authenticate_EX Response |
19 | 8.2 Authentication procedure 8.2.1 Protocol requirements 8.2.2 Procedure |
21 | a) When the interrogator received the MAM 1.1 Response (the optional field TTPID presents), it should send the Authenticate_EX command to the TTP, including the information of TID,IID,TTPID,RNt and RNi. b) After receiving the Authenticate_EX command, the TTP shall verify the tag and interrogator certificate (See IETF RFC 3280 for the certificates status verification) and send the Authenticate_EX Response to the interrogator,including the information… c) When the interrogator received the Authenticate_EX Response from the TTP, it should check the tag validity by RNt, TID and the authentication results of the tag RESt. If the verification is failed, ignore the response and the authentication proced… d) After receiving the Authenticate(MAM 1.2 Message), the tag should check the interrogator validity by RNi, IID and the authentication results of the interrogator RESi. If the verification is failed, ignore the response and the authentication procedu… 9 Authenticate Communication Figure 4 – Authenticate communication |
22 | 10 Secure Communication Figure 5 – Secure communication |
23 | Annex A (normative) State transition table A.1 Ready state transition table Table A.1 — Ready state transition table A.2 Authenticate state transition table Table A.2 — Authenticate state transition table A.3 AuthComm state transition table Table A.3 — AuthComm state transition table A.4 SecureComm state transition table Table A.4 — SecureComm state transition table |
24 | Annex B (normative) Error codes and error handling B.1 Error code format Table B.1 — Error code format B.2 Error type and error subcode Table B.2 — Error type and error subcode |
25 | Annex C (normative) Cipher description |
26 | Annex D (informative) Test Vectors D.1 Authentication Elliptic E curve D.2 Authentication Parameters |
27 | D.3 Authentication Process |
29 | D.4 Authenticate EX Command |
31 | Annex E (normative) Protocol specific E.1 Protocol Specific Operation E.2 ISO/IEC 18000-4 Mode 3 E.2.1 General E.2.2 Authenticate command Table E.1 — Payload Table E.2 — Data Table E.3 — Payload |
32 | Table E.4 — Data Table E.5 — MAM1.1 Message Table E.6 — MAM1.1 Response format Table E.7 — MAM1.2 Message |
33 | Table E.8 — MAM1.1 Response format E.2.3 AuthComm command Table E.9 — Payload Table E.10 — Data |
34 | Table E.11 — Payload Table E.12 — Data E.2.4 SecureComm command Table E.13 — Payload Table E.14 — Data |
35 | Table E.15 — Payload Table E.16 — Data |
36 | Annex F (normative) Protocol message’s fragmentation and defragmentation |
37 | Annex G (informative) Examples of ECC parameters G.1 Principle G.2 ECC parameters used in the authentication mechanism |