{"id":349696,"date":"2024-10-20T00:38:09","date_gmt":"2024-10-20T00:38:09","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-14-30289070-dc\/"},"modified":"2024-10-26T00:21:01","modified_gmt":"2024-10-26T00:21:01","slug":"bsi-14-30289070-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-14-30289070-dc\/","title":{"rendered":"BSI 14\/30289070 DC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Conformance 2.1 Claiming conformance 2.2 Interrogator conformance and obligations 2.3 Tag conformance and obligations <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 3 Normative references 4 Terms and definitions 4.1 Authenticated Communication 4.2 CryptoAuthCmd(Payload) 4.3 CryptoAuthResp(Payload) 4.4 CryptoCommCmd(Payload) 4.5 CryptoCommResp(Payload) <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4.6 CryptoKeyUpdate(Payload) 4.7 CryptoSecCommCmd(Payload) 4.8 CryptoSecCommResp(Payload) 4.9 Keystream 4.10 Secure Authenticated Communication 5 Symbols and abbreviated terms 5.1 Symbols 5.2 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 6 Cipher introduction 7 Parameter definition <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 8 State diagram <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 9 Initialization and resetting 10 Authentication 10.1 General <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 10.2 Tag Authentication (TA) <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 10.2.1 CryptoAuthCmd(TA.1 Payload for Tag CS) 10.2.2 CryptoAuthResp(TA.1 Payload for Interrogator CS) 10.2.3 Final Interrogator Processing <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 10.3 Interrogator Authentication (IA) 10.3.1 CryptoAuthCmd(IA.1 Payload for Tag CS) 10.3.2 CryptoAuthResp(IA.1 Payload for Interrogator CS) <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 10.3.3 CryptoAuthCmd(IA.2 Payload for Tag CS) 10.3.4 CryptoAuthResp(IA.2 Payload for Interrogator CS) 10.4 Mutual Authentication (MA) <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 10.4.1 CryptoAuthCmd (MA.1 Payload for Tag CS) 10.4.2 CryptoAuthResp(MA.1 Payload for Interrogator CS) 10.4.3 CryptoAuthCmd(MA.2 Payload for Tag CS) <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 10.4.4 CryptoAuthResp(MA.2 Payload for Interrogator CS) 10.4.5 Final Interrogator Processing <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 11 Communication 11.1 General 11.2 Authenticated Communication <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 11.3 Secure Authenticated Communication <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 12 Key table and key update <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Annex A (normative) State transition tables A.1 Present state: CS-Reset <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | A.2 Present state: CS-Init A.3 Present state: TA.1 <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | A.4 Present state: IA.1 A.5 Present state: IA.2 <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | A.6 Present state: MA.1 <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | A.7 Present state: MA.2 <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Annex B (normative) Error conditions and error handling <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Annex C (normative) Cipher description <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Annex D (informative) Test vectors <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Annex E (normative) Protocol specific E.1 Applicable air interface protocols E.2 Security Services for ISO\/IEC 18000-3 Mode 1 E.3 Security Services for ISO\/IEC 18000-63 E.3.1 General <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | E.3.2 Protocol Commands for Security Services E.3.2.1 Challenge Command <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | E.3.2.2 Authenticate Command E.3.2.3 AuthComm Command E.3.2.4 SecureComm Command <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | E.3.2.5 KeyUpdate Command E.3.3 Reporting Crypto Suite Errors <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | E.3.4 Example of Tag Authentication using Challenge <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | E.3.5 Example of Tag Authentication using Authenticate <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | E.3.6 Example of Mutual Authentication using Challenge <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO\/IEC 29167-13. Information technology. Automatic identification and data capture techniques. Part 13. Air Interface for security services. Crypto suite Grain-128A<\/b><\/p>\n |