Shopping Cart

No products in the cart.

BSI 14/30289070 DC:2014 Edition

$13.70

BS ISO/IEC 29167-13. Information technology. Automatic identification and data capture techniques. Part 13. Air Interface for security services. Crypto suite Grain-128A

Published By Publication Date Number of Pages
BSI 2014 43
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
7 Foreword
8 Introduction
9 1 Scope
2 Conformance
2.1 Claiming conformance
2.2 Interrogator conformance and obligations
2.3 Tag conformance and obligations
10 3 Normative references
4 Terms and definitions
4.1
Authenticated Communication
4.2
CryptoAuthCmd(Payload)
4.3
CryptoAuthResp(Payload)
4.4
CryptoCommCmd(Payload)
4.5
CryptoCommResp(Payload)
11 4.6
CryptoKeyUpdate(Payload)
4.7
CryptoSecCommCmd(Payload)
4.8
CryptoSecCommResp(Payload)
4.9
Keystream
4.10
Secure Authenticated Communication
5 Symbols and abbreviated terms
5.1 Symbols
5.2 Abbreviated terms
12 6 Cipher introduction
7 Parameter definition
13 8 State diagram
14 9 Initialization and resetting
10 Authentication
10.1 General
15 10.2 Tag Authentication (TA)
16 10.2.1 CryptoAuthCmd(TA.1 Payload for Tag CS)
10.2.2 CryptoAuthResp(TA.1 Payload for Interrogator CS)
10.2.3 Final Interrogator Processing
17 10.3 Interrogator Authentication (IA)
10.3.1 CryptoAuthCmd(IA.1 Payload for Tag CS)
10.3.2 CryptoAuthResp(IA.1 Payload for Interrogator CS)
18 10.3.3 CryptoAuthCmd(IA.2 Payload for Tag CS)
10.3.4 CryptoAuthResp(IA.2 Payload for Interrogator CS)
10.4 Mutual Authentication (MA)
19 10.4.1 CryptoAuthCmd (MA.1 Payload for Tag CS)
10.4.2 CryptoAuthResp(MA.1 Payload for Interrogator CS)
10.4.3 CryptoAuthCmd(MA.2 Payload for Tag CS)
20 10.4.4 CryptoAuthResp(MA.2 Payload for Interrogator CS)
10.4.5 Final Interrogator Processing
21 11 Communication
11.1 General
11.2 Authenticated Communication
22 11.3 Secure Authenticated Communication
23 12 Key table and key update
24 Annex A (normative) State transition tables
A.1 Present state: CS-Reset
25 A.2 Present state: CS-Init
A.3 Present state: TA.1
26 A.4 Present state: IA.1
A.5 Present state: IA.2
27 A.6 Present state: MA.1
28 A.7 Present state: MA.2
29 Annex B (normative) Error conditions and error handling
30 Annex C (normative) Cipher description
33 Annex D (informative) Test vectors
34 Annex E (normative) Protocol specific
E.1 Applicable air interface protocols
E.2 Security Services for ISO/IEC 18000-3 Mode 1
E.3 Security Services for ISO/IEC 18000-63
E.3.1 General
37 E.3.2 Protocol Commands for Security Services
E.3.2.1 Challenge Command
38 E.3.2.2 Authenticate Command
E.3.2.3 AuthComm Command
E.3.2.4 SecureComm Command
39 E.3.2.5 KeyUpdate Command
E.3.3 Reporting Crypto Suite Errors
40 E.3.4 Example of Tag Authentication using Challenge
41 E.3.5 Example of Tag Authentication using Authenticate
42 E.3.6 Example of Mutual Authentication using Challenge
BSI 14/30289070 DC
$13.70