Shopping Cart

No products in the cart.

BSI 14/30275438 DC:2014 Edition

$13.70

BS ISO/IEC 29167-12. Information technology. Automatic identification and data capture techniques. Part 12. Crypto suite ECC-DH security services for air interface communication

Published By Publication Date Number of Pages
BSI 2014 52
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
7 Foreword
 Part 1: Security services for RFID air interfaces
 Part 10: Crypto suite AES-128 security services for air interface communications
 Part 11: Crypto suite PRESENT-80 security services for air interface communications
 Part 12: Crypto suite ECC-DH security services for air interface communications
 Part 13: Crypto suite Grain-128A security services for air interface communications
 Part 14: Crypto suite AES OFB security services for air interface communications
 Part 15: Crypto suite XOR security services for air interface communications
 Part 16: Crypto suite ECDSA-ECDH security services for air interface communications
 Part 17: Crypto suite cryptoGPS security services for air interface communications
 Part 19: Crypto suite RAMON security services for air interface communications
8 Introduction
9 1 Scope
2 Conformance
2.1 Claiming conformance
2.2 Interrogator conformance and obligations
2.3 Tag conformance and obligations
10 3 Normative references
11 4 Terms and definitions
4.1
Command (Message)
4.2
Certificate
4.3
4.4
4.5
4.6
4.7
4.8
4.9
4.10
5 Symbols and abbreviated terms
5.1 Symbols
12 5.2 Abbreviated terms
14 6 Introduction of the ECC-DH crypto suite
6.1 Core functionality
15 6.2 Design principles of the crypto suite
16 7 Parameter definitions
7.1 Elliptic curve parameters
7.2 Parameters of the EPIF Format
17 7.3 Random number generation
18 8 Crypto suite state diagram
9 Initialization and resetting
19 10 Tag Authentication
10.1 Introduction
10.2 Message and Response formatting
10.2.1 Description of Message and Response concept
20 10.2.2 Transmission order of the data
10.2.3 Parsing the Message
If AuthParam = “00b” the Tag shall parse Message as described in section 10.3
If AuthParam = “01b” the Tag shall parse Message as described in section 10.4
21 10.3 TAM1.0
10.3.1 TAM1.0 Message – write certificate data
10.3.2 TAM1.0 Response – status of write operation
10.3.3 Protection of certificate record
22 10.4 TAM1.1
10.4.1 TAM1.1 Message – request certificate data
10.4.2 TAM1.1 Response – certificate Data
23 10.5 TAM1.2
10.5.1 TAM1.2: Message – send Interrogator challenge
10.5.2 TAM1.2 Response – Authentication result
24 10.6 TAM1.3
10.6.1 TAM1.3: Message – request certificate data and send challenge
10.6.2 TAM1.3 Response – certificate data and authentication result
25 11 Certificate memory
11.1 Certificate memory structure
26 11.2 Certificate record
27 11.3 Compressed X.509 certificate
29 11.4 X.509 certificate
11.5 Custom certificates
12 Tag Authentication procedure
12.1.1.1 IChallenge generation and formatting
30 12.1.1.2 IChallenge examination
12.1.1.3 TResponse generation and formatting
31 12.1.1.4 TResponse examination
Step 1: Error examination
Step 2: Error examination of Tag certificate
Step 3: Examination of well formed TResponse
Step 4: Cryptographic examination
32 13 Communication
14 Key table and key update
33 Annex A (normative) Cryptographic suite State transition table
34 Annex B (normative) Error conditions and error handling
35 Annex C (normative) Cipher description
C.1 Elliptic curve operations
C.2 Error-protected Isomorphic Field (EPIF) Representation
C.2.1 Computing the isomorphism ρ
36 C.2.2 Computing the mapping σ
C.2.3 Computing the mapping toEPIF
C.2.4 Values
37 Annex D (informative) Examples ECC cryptographic protocol
D.1 Example 1
38 D.2 Example 2
39 Annex E (normative) Air Interface Protocol specific information
E.1 General
E.1.1 Supported Security Services
40 E.2 Security Services for ISO/IEC 18000-63
E.2.1 ISO/IEC 18000-63 Protocol Commands
E.2.2 Security commands in ISO/IEC 18000-63
41 E.2.3 Implementation of crypto suite error conditions in ISO/IEC 18000-63
E.2.4 Key Properties
E.2.5 Compressed certificate
42 Annex F (normative) Reconstruction of X.509 Certificate
F.1 Introduction to the reconstruction process
43 F.2 X.509 Certificate Structure
44 F.2.1 Extension Fields
F.2.1.1 Authority Key Identifier
F.2.1.2 Key Usage
F.3 Certificate Fields
F.3.1 tbsCertificate
45 F.3.1.1 Version (FIXED value)
F.3.1.2 Serial Number (DEFAULT value)
46 F.3.1.3 Signature Algorithm (FIXED value)
F.3.1.4 Issuer
47 F.3.1.5 Validity (DEFAULT value)
F.3.1.6 Subject (DEFAULT value)
48 F.3.1.7 Subject Public Key Info
F.3.1.7.1 Algorithm Identifier (FIXED)
49 F.3.1.7.2 Public Key
F.3.1.8 X.509 v3 Extensions
50 F.3.1.8.1 Key Usage (FIXED)
F.3.1.8.2 Authority Key Identifier
F.3.2 signatureAlgorithm (FIXED)
51 F.3.3 signatureValue
BSI 14/30275438 DC
$13.70