BSI 14/30275438 DC:2014 Edition
$13.70
BS ISO/IEC 29167-12. Information technology. Automatic identification and data capture techniques. Part 12. Crypto suite ECC-DH security services for air interface communication
Published By | Publication Date | Number of Pages |
BSI | 2014 | 52 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
7 | Foreword Part 1: Security services for RFID air interfaces Part 10: Crypto suite AES-128 security services for air interface communications Part 11: Crypto suite PRESENT-80 security services for air interface communications Part 12: Crypto suite ECC-DH security services for air interface communications Part 13: Crypto suite Grain-128A security services for air interface communications Part 14: Crypto suite AES OFB security services for air interface communications Part 15: Crypto suite XOR security services for air interface communications Part 16: Crypto suite ECDSA-ECDH security services for air interface communications Part 17: Crypto suite cryptoGPS security services for air interface communications Part 19: Crypto suite RAMON security services for air interface communications |
8 | Introduction |
9 | 1 Scope 2 Conformance 2.1 Claiming conformance 2.2 Interrogator conformance and obligations 2.3 Tag conformance and obligations |
10 | 3 Normative references |
11 | 4 Terms and definitions 4.1 Command (Message) 4.2 Certificate 4.3 4.4 4.5 4.6 4.7 4.8 4.9 4.10 5 Symbols and abbreviated terms 5.1 Symbols |
12 | 5.2 Abbreviated terms |
14 | 6 Introduction of the ECC-DH crypto suite 6.1 Core functionality |
15 | 6.2 Design principles of the crypto suite |
16 | 7 Parameter definitions 7.1 Elliptic curve parameters 7.2 Parameters of the EPIF Format |
17 | 7.3 Random number generation |
18 | 8 Crypto suite state diagram 9 Initialization and resetting |
19 | 10 Tag Authentication 10.1 Introduction 10.2 Message and Response formatting 10.2.1 Description of Message and Response concept |
20 | 10.2.2 Transmission order of the data 10.2.3 Parsing the Message If AuthParam = “00b” the Tag shall parse Message as described in section 10.3 If AuthParam = “01b” the Tag shall parse Message as described in section 10.4 |
21 | 10.3 TAM1.0 10.3.1 TAM1.0 Message – write certificate data 10.3.2 TAM1.0 Response – status of write operation 10.3.3 Protection of certificate record |
22 | 10.4 TAM1.1 10.4.1 TAM1.1 Message – request certificate data 10.4.2 TAM1.1 Response – certificate Data |
23 | 10.5 TAM1.2 10.5.1 TAM1.2: Message – send Interrogator challenge 10.5.2 TAM1.2 Response – Authentication result |
24 | 10.6 TAM1.3 10.6.1 TAM1.3: Message – request certificate data and send challenge 10.6.2 TAM1.3 Response – certificate data and authentication result |
25 | 11 Certificate memory 11.1 Certificate memory structure |
26 | 11.2 Certificate record |
27 | 11.3 Compressed X.509 certificate |
29 | 11.4 X.509 certificate 11.5 Custom certificates 12 Tag Authentication procedure 12.1.1.1 IChallenge generation and formatting |
30 | 12.1.1.2 IChallenge examination 12.1.1.3 TResponse generation and formatting |
31 | 12.1.1.4 TResponse examination Step 1: Error examination Step 2: Error examination of Tag certificate Step 3: Examination of well formed TResponse Step 4: Cryptographic examination |
32 | 13 Communication 14 Key table and key update |
33 | Annex A (normative) Cryptographic suite State transition table |
34 | Annex B (normative) Error conditions and error handling |
35 | Annex C (normative) Cipher description C.1 Elliptic curve operations C.2 Error-protected Isomorphic Field (EPIF) Representation C.2.1 Computing the isomorphism ρ |
36 | C.2.2 Computing the mapping σ C.2.3 Computing the mapping toEPIF C.2.4 Values |
37 | Annex D (informative) Examples ECC cryptographic protocol D.1 Example 1 |
38 | D.2 Example 2 |
39 | Annex E (normative) Air Interface Protocol specific information E.1 General E.1.1 Supported Security Services |
40 | E.2 Security Services for ISO/IEC 18000-63 E.2.1 ISO/IEC 18000-63 Protocol Commands E.2.2 Security commands in ISO/IEC 18000-63 |
41 | E.2.3 Implementation of crypto suite error conditions in ISO/IEC 18000-63 E.2.4 Key Properties E.2.5 Compressed certificate |
42 | Annex F (normative) Reconstruction of X.509 Certificate F.1 Introduction to the reconstruction process |
43 | F.2 X.509 Certificate Structure |
44 | F.2.1 Extension Fields F.2.1.1 Authority Key Identifier F.2.1.2 Key Usage F.3 Certificate Fields F.3.1 tbsCertificate |
45 | F.3.1.1 Version (FIXED value) F.3.1.2 Serial Number (DEFAULT value) |
46 | F.3.1.3 Signature Algorithm (FIXED value) F.3.1.4 Issuer |
47 | F.3.1.5 Validity (DEFAULT value) F.3.1.6 Subject (DEFAULT value) |
48 | F.3.1.7 Subject Public Key Info F.3.1.7.1 Algorithm Identifier (FIXED) |
49 | F.3.1.7.2 Public Key F.3.1.8 X.509 v3 Extensions |
50 | F.3.1.8.1 Key Usage (FIXED) F.3.1.8.2 Authority Key Identifier F.3.2 signatureAlgorithm (FIXED) |
51 | F.3.3 signatureValue |