{"id":349560,"date":"2024-10-20T00:37:24","date_gmt":"2024-10-20T00:37:24","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-14-30275438-dc\/"},"modified":"2024-10-26T00:19:16","modified_gmt":"2024-10-26T00:19:16","slug":"bsi-14-30275438-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-14-30275438-dc\/","title":{"rendered":"BSI 14\/30275438 DC"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
7<\/td>\nForeword
\uf0be Part 1: Security services for RFID air interfaces
\uf0be Part 10: Crypto suite AES-128 security services for air interface communications
\uf0be Part 11: Crypto suite PRESENT-80 security services for air interface communications
\uf0be Part 12: Crypto suite ECC-DH security services for air interface communications
\uf0be Part 13: Crypto suite Grain-128A security services for air interface communications
\uf0be Part 14: Crypto suite AES OFB security services for air interface communications
\uf0be Part 15: Crypto suite XOR security services for air interface communications
\uf0be Part 16: Crypto suite ECDSA-ECDH security services for air interface communications
\uf0be Part 17: Crypto suite cryptoGPS security services for air interface communications
\uf0be Part 19: Crypto suite RAMON security services for air interface communications <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Conformance
2.1 Claiming conformance
2.2 Interrogator conformance and obligations
2.3 Tag conformance and obligations <\/td>\n<\/tr>\n
10<\/td>\n3 Normative references <\/td>\n<\/tr>\n
11<\/td>\n4 Terms and definitions
4.1
Command (Message)
4.2
Certificate
4.3
4.4
4.5
4.6
4.7
4.8
4.9
4.10
5 Symbols and abbreviated terms
5.1 Symbols <\/td>\n<\/tr>\n
12<\/td>\n5.2 Abbreviated terms <\/td>\n<\/tr>\n
14<\/td>\n6 Introduction of the ECC-DH crypto suite
6.1 Core functionality <\/td>\n<\/tr>\n
15<\/td>\n6.2 Design principles of the crypto suite <\/td>\n<\/tr>\n
16<\/td>\n7 Parameter definitions
7.1 Elliptic curve parameters
7.2 Parameters of the EPIF Format <\/td>\n<\/tr>\n
17<\/td>\n7.3 Random number generation <\/td>\n<\/tr>\n
18<\/td>\n8 Crypto suite state diagram
9 Initialization and resetting <\/td>\n<\/tr>\n
19<\/td>\n10 Tag Authentication
10.1 Introduction
10.2 Message and Response formatting
10.2.1 Description of Message and Response concept <\/td>\n<\/tr>\n
20<\/td>\n10.2.2 Transmission order of the data
10.2.3 Parsing the Message
If AuthParam = “00b” the Tag shall parse Message as described in section 10.3
If AuthParam = “01b” the Tag shall parse Message as described in section 10.4 <\/td>\n<\/tr>\n
21<\/td>\n10.3 TAM1.0
10.3.1 TAM1.0 Message \u2013 write certificate data
10.3.2 TAM1.0 Response \u2013 status of write operation
10.3.3 Protection of certificate record <\/td>\n<\/tr>\n
22<\/td>\n10.4 TAM1.1
10.4.1 TAM1.1 Message \u2013 request certificate data
10.4.2 TAM1.1 Response \u2013 certificate Data <\/td>\n<\/tr>\n
23<\/td>\n10.5 TAM1.2
10.5.1 TAM1.2: Message \u2013 send Interrogator challenge
10.5.2 TAM1.2 Response \u2013 Authentication result <\/td>\n<\/tr>\n
24<\/td>\n10.6 TAM1.3
10.6.1 TAM1.3: Message \u2013 request certificate data and send challenge
10.6.2 TAM1.3 Response \u2013 certificate data and authentication result <\/td>\n<\/tr>\n
25<\/td>\n11 Certificate memory
11.1 Certificate memory structure <\/td>\n<\/tr>\n
26<\/td>\n11.2 Certificate record <\/td>\n<\/tr>\n
27<\/td>\n11.3 Compressed X.509 certificate <\/td>\n<\/tr>\n
29<\/td>\n11.4 X.509 certificate
11.5 Custom certificates
12 Tag Authentication procedure
12.1.1.1 IChallenge generation and formatting <\/td>\n<\/tr>\n
30<\/td>\n12.1.1.2 IChallenge examination
12.1.1.3 TResponse generation and formatting <\/td>\n<\/tr>\n
31<\/td>\n12.1.1.4 TResponse examination
Step 1: Error examination
Step 2: Error examination of Tag certificate
Step 3: Examination of well formed TResponse
Step 4: Cryptographic examination <\/td>\n<\/tr>\n
32<\/td>\n13 Communication
14 Key table and key update <\/td>\n<\/tr>\n
33<\/td>\nAnnex A (normative) Cryptographic suite State transition table <\/td>\n<\/tr>\n
34<\/td>\nAnnex B (normative) Error conditions and error handling <\/td>\n<\/tr>\n
35<\/td>\nAnnex C (normative) Cipher description
C.1 Elliptic curve operations
C.2 Error-protected Isomorphic Field (EPIF) Representation
C.2.1 Computing the isomorphism \u03c1 <\/td>\n<\/tr>\n
36<\/td>\nC.2.2 Computing the mapping \u03c3
C.2.3 Computing the mapping toEPIF
C.2.4 Values <\/td>\n<\/tr>\n
37<\/td>\nAnnex D (informative) Examples ECC cryptographic protocol
D.1 Example 1 <\/td>\n<\/tr>\n
38<\/td>\nD.2 Example 2 <\/td>\n<\/tr>\n
39<\/td>\nAnnex E (normative) Air Interface Protocol specific information
E.1 General
E.1.1 Supported Security Services <\/td>\n<\/tr>\n
40<\/td>\nE.2 Security Services for ISO\/IEC 18000-63
E.2.1 ISO\/IEC 18000-63 Protocol Commands
E.2.2 Security commands in ISO\/IEC 18000-63 <\/td>\n<\/tr>\n
41<\/td>\nE.2.3 Implementation of crypto suite error conditions in ISO\/IEC 18000-63
E.2.4 Key Properties
E.2.5 Compressed certificate <\/td>\n<\/tr>\n
42<\/td>\nAnnex F (normative) Reconstruction of X.509 Certificate
F.1 Introduction to the reconstruction process <\/td>\n<\/tr>\n
43<\/td>\nF.2 X.509 Certificate Structure <\/td>\n<\/tr>\n
44<\/td>\nF.2.1 Extension Fields
F.2.1.1 Authority Key Identifier
F.2.1.2 Key Usage
F.3 Certificate Fields
F.3.1 tbsCertificate <\/td>\n<\/tr>\n
45<\/td>\nF.3.1.1 Version (FIXED value)
F.3.1.2 Serial Number (DEFAULT value) <\/td>\n<\/tr>\n
46<\/td>\nF.3.1.3 Signature Algorithm (FIXED value)
F.3.1.4 Issuer <\/td>\n<\/tr>\n
47<\/td>\nF.3.1.5 Validity (DEFAULT value)
F.3.1.6 Subject (DEFAULT value) <\/td>\n<\/tr>\n
48<\/td>\nF.3.1.7 Subject Public Key Info
F.3.1.7.1 Algorithm Identifier (FIXED) <\/td>\n<\/tr>\n
49<\/td>\nF.3.1.7.2 Public Key
F.3.1.8 X.509 v3 Extensions <\/td>\n<\/tr>\n
50<\/td>\nF.3.1.8.1 Key Usage (FIXED)
F.3.1.8.2 Authority Key Identifier
F.3.2 signatureAlgorithm (FIXED) <\/td>\n<\/tr>\n
51<\/td>\nF.3.3 signatureValue <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS ISO\/IEC 29167-12. Information technology. Automatic identification and data capture techniques. Part 12. Crypto suite ECC-DH security services for air interface communication<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2014<\/td>\n52<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":349567,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[662,2641],"product_tag":[],"class_list":{"0":"post-349560","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-040-50","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/349560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/349567"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=349560"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=349560"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=349560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}