BS ISO/IEC 29167-16:2022:2023 Edition
$167.15
Information technology. Automatic identification and data capture techniques – Crypto suite ECDSA-ECDH security services for air interface communications
Published By | Publication Date | Number of Pages |
BSI | 2023 | 40 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
6 | Foreword |
7 | Introduction |
9 | 1 Scope 2 Normative references |
10 | 3 Terms and definitions 4 Symbols and abbreviated terms 4.1 Symbols 4.2 Abbreviated terms |
11 | 5 Conformance 5.1 Claiming conformance |
12 | 5.2 Interrogator conformance and obligations 5.3 Tag conformance and obligations 6 Cipher introduction 7 Parameter definitions 7.1 Parameter definitions |
14 | 7.2 Certiticate format 8 State diagram 9 Initialization and resetting |
15 | 10 Authentication 10.1 General 10.2 Authenticate message 10.2.1 Message in Authenticate command and reply |
16 | 10.2.2 Authenticate(MAM1.1 Message) |
17 | 10.2.3 MAM1.1 Response |
18 | 10.2.4 Authenticate(MAM1.2 Message) 10.2.5 MAM1.2 Response |
19 | 10.3 Authentication procedure 10.3.1 Protocol requirements 10.3.2 Procedure |
21 | 11 Communication 11.1 Authenticate communication 11.2 Secure communication |
23 | Annex A (normative) State transition table |
24 | Annex B (normative) Error codes and error handling |
25 | Annex C (normative) Cipher description |
26 | Annex D (informative) Test vectors |
31 | Annex E (normative) Protocol specific operation |
35 | Annex F (normative) Protocol message’s fragmentation and defragmentation |
36 | Annex G (informative) Examples of ECC parameters |
37 | Annex H (normative) TTP involving |
39 | Bibliography |