{"id":349641,"date":"2024-10-20T00:37:50","date_gmt":"2024-10-20T00:37:50","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-14-30285138-dc\/"},"modified":"2024-10-26T00:20:17","modified_gmt":"2024-10-26T00:20:17","slug":"bsi-14-30285138-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-14-30285138-dc\/","title":{"rendered":"BSI 14\/30285138 DC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Conformance 2.1 Claiming conformance 2.2 Interrogator conformance and obligations 2.3 Tag conformance and obligations 3 Normative references <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Terms and definitions 4.1 4.2 4.3 5 Symbols and abbreviated terms 5.1 Symbols 5.2 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 6 Cipher introduction 6.1 General 6.2 Encryption in AES OFB mode <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 6.3 Decryption in AES OFB mode <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 7 Parameter definitions <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 8 State diagram 9 Initialization and resetting 10 Authentication 10.1 General 10.1.1 Authentication types <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 10.1.2 CS_Initialization (Authentication type: AuthMethod \u201c111\u201d, Mandatory) 10.1.2.1 General 10.1.2.2 Use of \u2018Authenticate\u2019 command 10.1.2.3 Tag response <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 10.2 Tag authentication (Authentication type: AuthMethod = \u201c000\u201d, Mandatory) 10.2.1 Tag authentication <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 10.2.2 Commands and responses for tag authentication 10.2.2.1 General 10.2.2.2 Authenticate Command (CS_Initialization) <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 10.2.2.3 Response (CS_Initialization) 10.2.2.4 Authenticate Command (Tag Authentication) 10.2.2.5 Response (Tag Authentication) 10.3 Interrogator authentication (Authentication type: AuthMethod = \u201c001\u201d, Optional) 10.3.1 Interrogator authentication <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 10.3.2 Commands and responses for interrogator authentication <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 10.3.2.1 General 10.3.2.2 Authenticate Command (CS_Initialization) 10.3.2.3 Response (CS_Initialization) 10.3.2.4 Authenticate Command (Interrogator Authentication 1) 10.3.2.5 Response (Interrogator Authentication 1) <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 10.3.2.6 Authenticate Command (Interrogator Authentication 2) 10.3.2.7 Response (Interrogator Authentication 2) 10.4 Mutual authentication (Authentication type: AuthMethod = \u201c010\u201d, Mandatory) 10.4.1 Mutual authentication <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 10.4.2 Commands and responses for mutual authentication 10.4.2.1 General 10.4.2.2 Authenticate Command (CS_initialization) 10.4.2.3 Response (CS_initialization) 10.4.2.4 Authenticate Command (Mutual Authentication 1) 10.4.2.5 Response (Mutual Authentication 1) <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 10.4.2.6 Authenticate Command (Mutual Authentication 2) 10.4.2.7 Response (Mutual Authentication 2) <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 11 Communication 12 Key management and key update 12.1 Master key acquisition 12.2 Session key generation <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 12.3 Key update 12.3.1 General 12.3.2 Command <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Annex A (normative) <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Annex B (normative) <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Annex C (normative) <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Annex D (informative) <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Annex E (normative) E.1 Protocol specific information E.2 Security services for ISO\/IEC 18000-63 <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | E.3 Challenge (Optional) E.3.1 General E.3.2 Command <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | Annex F (informative) F.1 Tag authentication via server (AuthMethod = \u201c011\u201d) <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | F.2 Commands and responses for tag authentication via server F.2.1 General F.2.2 Authenticate Command (CS_Initialization) <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | F.2.3 Response (CS_Initialization) F.2.4 Authenticate Command (Tag Authentication via Server) F.2.5 Response (Tag Authentication via Server) <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO\/IEC 29167-14. Information technology. Automatic identification and data capture techniques. Part 14. Crypto suite AES OFB security services for air interface communications<\/b><\/p>\n |