BSI 14/30289070 DC:2014 Edition
$13.70
BS ISO/IEC 29167-13. Information technology. Automatic identification and data capture techniques. Part 13. Air Interface for security services. Crypto suite Grain-128A
Published By | Publication Date | Number of Pages |
BSI | 2014 | 43 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
7 | Foreword |
8 | Introduction |
9 | 1 Scope 2 Conformance 2.1 Claiming conformance 2.2 Interrogator conformance and obligations 2.3 Tag conformance and obligations |
10 | 3 Normative references 4 Terms and definitions 4.1 Authenticated Communication 4.2 CryptoAuthCmd(Payload) 4.3 CryptoAuthResp(Payload) 4.4 CryptoCommCmd(Payload) 4.5 CryptoCommResp(Payload) |
11 | 4.6 CryptoKeyUpdate(Payload) 4.7 CryptoSecCommCmd(Payload) 4.8 CryptoSecCommResp(Payload) 4.9 Keystream 4.10 Secure Authenticated Communication 5 Symbols and abbreviated terms 5.1 Symbols 5.2 Abbreviated terms |
12 | 6 Cipher introduction 7 Parameter definition |
13 | 8 State diagram |
14 | 9 Initialization and resetting 10 Authentication 10.1 General |
15 | 10.2 Tag Authentication (TA) |
16 | 10.2.1 CryptoAuthCmd(TA.1 Payload for Tag CS) 10.2.2 CryptoAuthResp(TA.1 Payload for Interrogator CS) 10.2.3 Final Interrogator Processing |
17 | 10.3 Interrogator Authentication (IA) 10.3.1 CryptoAuthCmd(IA.1 Payload for Tag CS) 10.3.2 CryptoAuthResp(IA.1 Payload for Interrogator CS) |
18 | 10.3.3 CryptoAuthCmd(IA.2 Payload for Tag CS) 10.3.4 CryptoAuthResp(IA.2 Payload for Interrogator CS) 10.4 Mutual Authentication (MA) |
19 | 10.4.1 CryptoAuthCmd (MA.1 Payload for Tag CS) 10.4.2 CryptoAuthResp(MA.1 Payload for Interrogator CS) 10.4.3 CryptoAuthCmd(MA.2 Payload for Tag CS) |
20 | 10.4.4 CryptoAuthResp(MA.2 Payload for Interrogator CS) 10.4.5 Final Interrogator Processing |
21 | 11 Communication 11.1 General 11.2 Authenticated Communication |
22 | 11.3 Secure Authenticated Communication |
23 | 12 Key table and key update |
24 | Annex A (normative) State transition tables A.1 Present state: CS-Reset |
25 | A.2 Present state: CS-Init A.3 Present state: TA.1 |
26 | A.4 Present state: IA.1 A.5 Present state: IA.2 |
27 | A.6 Present state: MA.1 |
28 | A.7 Present state: MA.2 |
29 | Annex B (normative) Error conditions and error handling |
30 | Annex C (normative) Cipher description |
33 | Annex D (informative) Test vectors |
34 | Annex E (normative) Protocol specific E.1 Applicable air interface protocols E.2 Security Services for ISO/IEC 18000-3 Mode 1 E.3 Security Services for ISO/IEC 18000-63 E.3.1 General |
37 | E.3.2 Protocol Commands for Security Services E.3.2.1 Challenge Command |
38 | E.3.2.2 Authenticate Command E.3.2.3 AuthComm Command E.3.2.4 SecureComm Command |
39 | E.3.2.5 KeyUpdate Command E.3.3 Reporting Crypto Suite Errors |
40 | E.3.4 Example of Tag Authentication using Challenge |
41 | E.3.5 Example of Tag Authentication using Authenticate |
42 | E.3.6 Example of Mutual Authentication using Challenge |