{"id":349641,"date":"2024-10-20T00:37:50","date_gmt":"2024-10-20T00:37:50","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-14-30285138-dc\/"},"modified":"2024-10-26T00:20:17","modified_gmt":"2024-10-26T00:20:17","slug":"bsi-14-30285138-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-14-30285138-dc\/","title":{"rendered":"BSI 14\/30285138 DC"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
7<\/td>\nForeword <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Conformance
2.1 Claiming conformance
2.2 Interrogator conformance and obligations
2.3 Tag conformance and obligations
3 Normative references <\/td>\n<\/tr>\n
10<\/td>\n4 Terms and definitions
4.1
4.2
4.3
5 Symbols and abbreviated terms
5.1 Symbols
5.2 Abbreviated terms <\/td>\n<\/tr>\n
11<\/td>\n6 Cipher introduction
6.1 General
6.2 Encryption in AES OFB mode <\/td>\n<\/tr>\n
12<\/td>\n6.3 Decryption in AES OFB mode <\/td>\n<\/tr>\n
14<\/td>\n7 Parameter definitions <\/td>\n<\/tr>\n
15<\/td>\n8 State diagram
9 Initialization and resetting
10 Authentication
10.1 General
10.1.1 Authentication types <\/td>\n<\/tr>\n
16<\/td>\n10.1.2 CS_Initialization (Authentication type: AuthMethod \u201c111\u201d, Mandatory)
10.1.2.1 General
10.1.2.2 Use of \u2018Authenticate\u2019 command
10.1.2.3 Tag response <\/td>\n<\/tr>\n
17<\/td>\n10.2 Tag authentication (Authentication type: AuthMethod = \u201c000\u201d, Mandatory)
10.2.1 Tag authentication <\/td>\n<\/tr>\n
18<\/td>\n10.2.2 Commands and responses for tag authentication
10.2.2.1 General
10.2.2.2 Authenticate Command (CS_Initialization) <\/td>\n<\/tr>\n
19<\/td>\n10.2.2.3 Response (CS_Initialization)
10.2.2.4 Authenticate Command (Tag Authentication)
10.2.2.5 Response (Tag Authentication)
10.3 Interrogator authentication (Authentication type: AuthMethod = \u201c001\u201d, Optional)
10.3.1 Interrogator authentication <\/td>\n<\/tr>\n
20<\/td>\n10.3.2 Commands and responses for interrogator authentication <\/td>\n<\/tr>\n
21<\/td>\n10.3.2.1 General
10.3.2.2 Authenticate Command (CS_Initialization)
10.3.2.3 Response (CS_Initialization)
10.3.2.4 Authenticate Command (Interrogator Authentication 1)
10.3.2.5 Response (Interrogator Authentication 1) <\/td>\n<\/tr>\n
22<\/td>\n10.3.2.6 Authenticate Command (Interrogator Authentication 2)
10.3.2.7 Response (Interrogator Authentication 2)
10.4 Mutual authentication (Authentication type: AuthMethod = \u201c010\u201d, Mandatory)
10.4.1 Mutual authentication <\/td>\n<\/tr>\n
24<\/td>\n10.4.2 Commands and responses for mutual authentication
10.4.2.1 General
10.4.2.2 Authenticate Command (CS_initialization)
10.4.2.3 Response (CS_initialization)
10.4.2.4 Authenticate Command (Mutual Authentication 1)
10.4.2.5 Response (Mutual Authentication 1) <\/td>\n<\/tr>\n
25<\/td>\n10.4.2.6 Authenticate Command (Mutual Authentication 2)
10.4.2.7 Response (Mutual Authentication 2) <\/td>\n<\/tr>\n
26<\/td>\n11 Communication
12 Key management and key update
12.1 Master key acquisition
12.2 Session key generation <\/td>\n<\/tr>\n
28<\/td>\n12.3 Key update
12.3.1 General
12.3.2 Command <\/td>\n<\/tr>\n
31<\/td>\nAnnex A (normative) <\/td>\n<\/tr>\n
32<\/td>\nAnnex B (normative) <\/td>\n<\/tr>\n
33<\/td>\nAnnex C (normative) <\/td>\n<\/tr>\n
34<\/td>\nAnnex D (informative) <\/td>\n<\/tr>\n
38<\/td>\nAnnex E (normative)
E.1 Protocol specific information
E.2 Security services for ISO\/IEC 18000-63 <\/td>\n<\/tr>\n
39<\/td>\nE.3 Challenge (Optional)
E.3.1 General
E.3.2 Command <\/td>\n<\/tr>\n
42<\/td>\nAnnex F (informative)
F.1 Tag authentication via server (AuthMethod = \u201c011\u201d) <\/td>\n<\/tr>\n
43<\/td>\nF.2 Commands and responses for tag authentication via server
F.2.1 General
F.2.2 Authenticate Command (CS_Initialization) <\/td>\n<\/tr>\n
44<\/td>\nF.2.3 Response (CS_Initialization)
F.2.4 Authenticate Command (Tag Authentication via Server)
F.2.5 Response (Tag Authentication via Server) <\/td>\n<\/tr>\n
45<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS ISO\/IEC 29167-14. Information technology. Automatic identification and data capture techniques. Part 14. Crypto suite AES OFB security services for air interface communications<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2014<\/td>\n45<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":349644,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[662,2641],"product_tag":[],"class_list":{"0":"post-349641","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-040-50","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/349641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/349644"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=349641"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=349641"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=349641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}