{"id":349560,"date":"2024-10-20T00:37:24","date_gmt":"2024-10-20T00:37:24","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-14-30275438-dc\/"},"modified":"2024-10-26T00:19:16","modified_gmt":"2024-10-26T00:19:16","slug":"bsi-14-30275438-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-14-30275438-dc\/","title":{"rendered":"BSI 14\/30275438 DC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
7<\/td>\n | Foreword \uf0be Part 1: Security services for RFID air interfaces \uf0be Part 10: Crypto suite AES-128 security services for air interface communications \uf0be Part 11: Crypto suite PRESENT-80 security services for air interface communications \uf0be Part 12: Crypto suite ECC-DH security services for air interface communications \uf0be Part 13: Crypto suite Grain-128A security services for air interface communications \uf0be Part 14: Crypto suite AES OFB security services for air interface communications \uf0be Part 15: Crypto suite XOR security services for air interface communications \uf0be Part 16: Crypto suite ECDSA-ECDH security services for air interface communications \uf0be Part 17: Crypto suite cryptoGPS security services for air interface communications \uf0be Part 19: Crypto suite RAMON security services for air interface communications <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Conformance 2.1 Claiming conformance 2.2 Interrogator conformance and obligations 2.3 Tag conformance and obligations <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 3 Normative references <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4 Terms and definitions 4.1 Command (Message) 4.2 Certificate 4.3 4.4 4.5 4.6 4.7 4.8 4.9 4.10 5 Symbols and abbreviated terms 5.1 Symbols <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.2 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6 Introduction of the ECC-DH crypto suite 6.1 Core functionality <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6.2 Design principles of the crypto suite <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 7 Parameter definitions 7.1 Elliptic curve parameters 7.2 Parameters of the EPIF Format <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7.3 Random number generation <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 8 Crypto suite state diagram 9 Initialization and resetting <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 10 Tag Authentication 10.1 Introduction 10.2 Message and Response formatting 10.2.1 Description of Message and Response concept <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 10.2.2 Transmission order of the data 10.2.3 Parsing the Message If AuthParam = “00b” the Tag shall parse Message as described in section 10.3 If AuthParam = “01b” the Tag shall parse Message as described in section 10.4 <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 10.3 TAM1.0 10.3.1 TAM1.0 Message \u2013 write certificate data 10.3.2 TAM1.0 Response \u2013 status of write operation 10.3.3 Protection of certificate record <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 10.4 TAM1.1 10.4.1 TAM1.1 Message \u2013 request certificate data 10.4.2 TAM1.1 Response \u2013 certificate Data <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 10.5 TAM1.2 10.5.1 TAM1.2: Message \u2013 send Interrogator challenge 10.5.2 TAM1.2 Response \u2013 Authentication result <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 10.6 TAM1.3 10.6.1 TAM1.3: Message \u2013 request certificate data and send challenge 10.6.2 TAM1.3 Response \u2013 certificate data and authentication result <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 11 Certificate memory 11.1 Certificate memory structure <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 11.2 Certificate record <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 11.3 Compressed X.509 certificate <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 11.4 X.509 certificate 11.5 Custom certificates 12 Tag Authentication procedure 12.1.1.1 IChallenge generation and formatting <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 12.1.1.2 IChallenge examination 12.1.1.3 TResponse generation and formatting <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 12.1.1.4 TResponse examination Step 1: Error examination Step 2: Error examination of Tag certificate Step 3: Examination of well formed TResponse Step 4: Cryptographic examination <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 13 Communication 14 Key table and key update <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Annex A (normative) Cryptographic suite State transition table <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Annex B (normative) Error conditions and error handling <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Annex C (normative) Cipher description C.1 Elliptic curve operations C.2 Error-protected Isomorphic Field (EPIF) Representation C.2.1 Computing the isomorphism \u03c1 <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | C.2.2 Computing the mapping \u03c3 C.2.3 Computing the mapping toEPIF C.2.4 Values <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Annex D (informative) Examples ECC cryptographic protocol D.1 Example 1 <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | D.2 Example 2 <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | Annex E (normative) Air Interface Protocol specific information E.1 General E.1.1 Supported Security Services <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | E.2 Security Services for ISO\/IEC 18000-63 E.2.1 ISO\/IEC 18000-63 Protocol Commands E.2.2 Security commands in ISO\/IEC 18000-63 <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | E.2.3 Implementation of crypto suite error conditions in ISO\/IEC 18000-63 E.2.4 Key Properties E.2.5 Compressed certificate <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | Annex F (normative) Reconstruction of X.509 Certificate F.1 Introduction to the reconstruction process <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | F.2 X.509 Certificate Structure <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | F.2.1 Extension Fields F.2.1.1 Authority Key Identifier F.2.1.2 Key Usage F.3 Certificate Fields F.3.1 tbsCertificate <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | F.3.1.1 Version (FIXED value) F.3.1.2 Serial Number (DEFAULT value) <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | F.3.1.3 Signature Algorithm (FIXED value) F.3.1.4 Issuer <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | F.3.1.5 Validity (DEFAULT value) F.3.1.6 Subject (DEFAULT value) <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | F.3.1.7 Subject Public Key Info F.3.1.7.1 Algorithm Identifier (FIXED) <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | F.3.1.7.2 Public Key F.3.1.8 X.509 v3 Extensions <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | F.3.1.8.1 Key Usage (FIXED) F.3.1.8.2 Authority Key Identifier F.3.2 signatureAlgorithm (FIXED) <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | F.3.3 signatureValue <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO\/IEC 29167-12. Information technology. Automatic identification and data capture techniques. Part 12. Crypto suite ECC-DH security services for air interface communication<\/b><\/p>\n |