BSI 15/30302199 DC:2015 Edition
$13.70
BS ISO/IEC 29167-19. Information technology. Automatic identification and data capture techniques. Part 19. Air Interface for security services crypto suite RAMON
Published By | Publication Date | Number of Pages |
BSI | 2015 | 89 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | 30302199 |
8 | file Foreword |
9 | Introduction |
11 | 1 Scope 2 Conformance 2.1 Claiming conformance 2.2 Interrogator conformance and obligations 2.3 Tag conformance and obligations |
12 | 3 Normative references 4 Terms and definitions 4.1 Authentication 4.2 CHI1, CHI2 4.3 CHT |
13 | 4.4 Confidentiality 4.5 DEC(key, data) 4.6 ENC(key, data) 4.7 IID 4.8 IV 4.9 Integrity 4.10 KE 4.11 KD 4.12 KV 4.13 KS 4.14 KENC |
14 | 4.15 KMAC 4.16 KESel 4.17 KSel 4.18 MAC(key, data) 4.19 MAMx,y 4.20 MIX(CH, RN, SID) 4.21 Non-traceability 4.22 R 4.23 RM_ENC(key, data) 4.24 RM_DEC(key, data) 4.25 RNT |
15 | 4.26 Secure communication 4.27 SENC 4.28 SMAC 4.29 SID 4.30 SSC 4.31 TAMx,y 5 Symbols and abbreviated terms 5.1 Symbols 5.2 Abbreviated terms |
16 | 5.3 Notation |
17 | 6 Crypto suite introduction 6.1 Overview |
18 | 6.2 Authentication protocols 6.2.1 Tag Identification 6.2.2 Symmetric mutual authentication |
20 | 6.3 Send Sequence Counter 6.4 Session key derivation 6.4.1 KDF in counter mode |
21 | 6.4.2 Key Derivation Scheme |
22 | 6.5 IID, SID, Used Keys and Their Personalisation |
23 | 6.6 Key table |
24 | 7 Parameter definitions |
25 | 8 Initialization and resetting 9 State diagrams 9.1 General |
26 | 9.2 State diagram and transitions for Tag identification |
27 | 9.2.1 Partial Result Mode |
28 | 9.2.2 Complete Result Mode 9.3 State diagram and transitions for mutual authentication 9.3.1 Partial Result Mode |
31 | 9.3.2 Complete Result Mode |
32 | 9.3.3 Combination of complete and partial result mode 10 Identification and Authentication 10.1 Tag identification 10.1.1 Partial Result Mode 10.1.2 Complete Result Mode |
33 | 10.2 Mutual authentication 10.2.1 Partial Result Mode |
34 | 10.2.2 Complete Result Mode |
35 | 10.3 The Authenticate command 10.3.1 Message formats for Tag identification |
36 | 10.3.1.1 Message format for RAMON memory read (optional) 10.3.2 Message formats for Mutual Authentication |
37 | 10.4 Authentication response 10.4.1 Response formats for Tag identification 10.4.1.1 Partial Result Mode |
38 | 10.4.1.2 Complete Result Mode 10.4.2 Response formats for mutual authentication |
39 | 10.4.2.1 Partial Result Mode |
40 | 10.4.2.2 Complete Result Mode 10.4.3 Authentication error response |
41 | 10.5 Determination of Result Modes |
42 | 11 Secure communication 11.1 Secure communication command |
43 | 11.2 Secure Communication response 11.2.1 Secure communication error response 11.3 Encoding of Read and Write commands for secure communication |
44 | 11.4 Application of secure messaging primitives 11.4.1 Secure Communication command messages |
46 | 11.4.2 Secure Communication response messages |
48 | 11.4.3 Explanation of cipher block chaining mode |
50 | Annex A (normative) State transition tables |
54 | Annex B (normative) Error codes and error handling |
55 | Annex C (normative) Cipher description C.1 Tag Identification Cryptogram Preparation |
56 | C.1.1 RAMON Memory Read – Cryptogram Preparation |
57 | C.1.2 Additional Data fields |
58 | C.2 The MIX function |
62 | C.3 Rabin-Montgomery Encryption |
63 | C.4 Rabin-Montgomery Decryption C.5 Definition of the Montgomery Residue C.6 The inverse MIX Function MIXP-1 |
64 | C.7 Padding for Symmetric Encryption C.8 Coding Examples C.8.1 Ramon Encryption |
68 | C.8.2 Ramon Decryption |
72 | Annex D (informative) Test Vectors D.1 Notation D.2 RAMON Keys D.3 The Authentication Message |
73 | D.4 RAMON Encryption D.5 Montgomery Reduction and Decryption |
75 | Annex E (normative) Protocol specific E.1 General E.1.1 Supported Security Services |
76 | E.2 Security Services for ISO/IEC 18000-3 mode 1 E.3 Security Services for ISO/IEC 18000-3 mode 3 E.4 Security Services for ISO/IEC 18000-4 mode 4 E.5 Security Services for ISO/IEC 18000-63 E.5.1 Tag Identification and memory read using the air interface Challenge command |
77 | E.6 Communication example (informative) E.6.1 Tag identification sequence in Partial Result Mode |
78 | E.6.2 Tag identification sequence in Complete Result Mod |
79 | E.6.3 Mutual authentication sequence |
80 | E.6.4 Secure Read and Write communication sequence |
81 | E.7 Implementation of CS error conditions E.7.1 Implementation of CS error conditions in ISO/IEC 18000-3 Mode-1 E.7.2 Implementation of CS error conditions in ISO/IEC 18000-3 Mode-3 E.7.3 Implementation of CS error conditions in ISO/IEC 18000-4 Mode-4 E.7.4 Implementation of CS error conditions in ISO/IEC 18000-63 |
82 | Annex F (informative) Non-traceable and integrity-protected Tag identification F.1 Enabling non-traceability for ISO/IEC 18000-63 UHF Tags F.1.1 EPC Memory |
83 | F.1.2 TID Memory F.1.3 Using ‘EPC coded’ SID to restore randomized SGIN and MCS |
84 | F.2 Enabling non-traceability for ISO/IEC 18000-3M1 HF Tags F.3 Signatures for integrity-protection of the SID |
85 | Annex G (informative) Memory Organisation for Secure UHF Tags (Proposal) G.1 General G.2 The Public Key storage buffer |
86 | G.3 Sector Selection |
87 | G.4 Structure of a Secure Memory Sector |
88 | G.5 Record Access and Addressing G.6 Access Bit Mapping G.7 Minimum Accessible Data Unit |
89 | Annex H (informative) Bibliography |