Shopping Cart

No products in the cart.

BSI 15/30302199 DC:2015 Edition

$13.70

BS ISO/IEC 29167-19. Information technology. Automatic identification and data capture techniques. Part 19. Air Interface for security services crypto suite RAMON

Published By Publication Date Number of Pages
BSI 2015 89
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
1 30302199
8 file
Foreword
9 Introduction
11 1 Scope
2 Conformance
2.1 Claiming conformance
2.2 Interrogator conformance and obligations
2.3 Tag conformance and obligations
12 3 Normative references
4 Terms and definitions
4.1 Authentication
4.2 CHI1, CHI2
4.3 CHT
13 4.4 Confidentiality
4.5 DEC(key, data)
4.6 ENC(key, data)
4.7 IID
4.8 IV
4.9 Integrity
4.10 KE
4.11 KD
4.12 KV
4.13 KS
4.14 KENC
14 4.15 KMAC
4.16 KESel
4.17 KSel
4.18 MAC(key, data)
4.19 MAMx,y
4.20 MIX(CH, RN, SID)
4.21 Non-traceability
4.22 R
4.23 RM_ENC(key, data)
4.24 RM_DEC(key, data)
4.25 RNT
15 4.26 Secure communication
4.27 SENC
4.28 SMAC
4.29 SID
4.30 SSC
4.31 TAMx,y
5 Symbols and abbreviated terms
5.1 Symbols
5.2 Abbreviated terms
16 5.3 Notation
17 6 Crypto suite introduction
6.1 Overview
18 6.2 Authentication protocols
6.2.1 Tag Identification
6.2.2 Symmetric mutual authentication
20 6.3 Send Sequence Counter
6.4 Session key derivation
6.4.1 KDF in counter mode
21 6.4.2 Key Derivation Scheme
22 6.5 IID, SID, Used Keys and Their Personalisation
23 6.6 Key table
24 7 Parameter definitions
25 8 Initialization and resetting
9 State diagrams
9.1 General
26 9.2 State diagram and transitions for Tag identification
27 9.2.1 Partial Result Mode
28 9.2.2 Complete Result Mode
9.3 State diagram and transitions for mutual authentication
9.3.1 Partial Result Mode
31 9.3.2 Complete Result Mode
32 9.3.3 Combination of complete and partial result mode
10 Identification and Authentication
10.1 Tag identification
10.1.1 Partial Result Mode
10.1.2 Complete Result Mode
33 10.2 Mutual authentication
10.2.1 Partial Result Mode
34 10.2.2 Complete Result Mode
35 10.3 The Authenticate command
10.3.1 Message formats for Tag identification
36 10.3.1.1 Message format for RAMON memory read (optional)
10.3.2 Message formats for Mutual Authentication
37 10.4 Authentication response
10.4.1 Response formats for Tag identification
10.4.1.1 Partial Result Mode
38 10.4.1.2 Complete Result Mode
10.4.2 Response formats for mutual authentication
39 10.4.2.1 Partial Result Mode
40 10.4.2.2 Complete Result Mode
10.4.3 Authentication error response
41 10.5 Determination of Result Modes
42 11 Secure communication
11.1 Secure communication command
43 11.2 Secure Communication response
11.2.1 Secure communication error response
11.3 Encoding of Read and Write commands for secure communication
44 11.4 Application of secure messaging primitives
11.4.1 Secure Communication command messages
46 11.4.2 Secure Communication response messages
48 11.4.3 Explanation of cipher block chaining mode
50 Annex A (normative) State transition tables
54 Annex B (normative) Error codes and error handling
55 Annex C (normative) Cipher description
C.1 Tag Identification Cryptogram Preparation
56 C.1.1 RAMON Memory Read – Cryptogram Preparation
57 C.1.2 Additional Data fields
58 C.2 The MIX function
62 C.3 Rabin-Montgomery Encryption
63 C.4 Rabin-Montgomery Decryption
C.5 Definition of the Montgomery Residue
C.6 The inverse MIX Function MIXP-1
64 C.7 Padding for Symmetric Encryption
C.8 Coding Examples
C.8.1 Ramon Encryption
68 C.8.2 Ramon Decryption
72 Annex D (informative) Test Vectors
D.1 Notation
D.2 RAMON Keys
D.3 The Authentication Message
73 D.4 RAMON Encryption
D.5 Montgomery Reduction and Decryption
75 Annex E (normative) Protocol specific
E.1 General
E.1.1 Supported Security Services
76 E.2 Security Services for ISO/IEC 18000-3 mode 1
E.3 Security Services for ISO/IEC 18000-3 mode 3
E.4 Security Services for ISO/IEC 18000-4 mode 4
E.5 Security Services for ISO/IEC 18000-63
E.5.1 Tag Identification and memory read using the air interface Challenge command
77 E.6 Communication example (informative)
E.6.1 Tag identification sequence in Partial Result Mode
78 E.6.2 Tag identification sequence in Complete Result Mod
79 E.6.3 Mutual authentication sequence
80 E.6.4 Secure Read and Write communication sequence
81 E.7 Implementation of CS error conditions
E.7.1 Implementation of CS error conditions in ISO/IEC 18000-3 Mode-1
E.7.2 Implementation of CS error conditions in ISO/IEC 18000-3 Mode-3
E.7.3 Implementation of CS error conditions in ISO/IEC 18000-4 Mode-4
E.7.4 Implementation of CS error conditions in ISO/IEC 18000-63
82 Annex F (informative) Non-traceable and integrity-protected Tag identification
F.1 Enabling non-traceability for ISO/IEC 18000-63 UHF Tags
F.1.1 EPC Memory
83 F.1.2 TID Memory
F.1.3 Using ‘EPC coded’ SID to restore randomized SGIN and MCS
84 F.2 Enabling non-traceability for ISO/IEC 18000-3M1 HF Tags
F.3 Signatures for integrity-protection of the SID
85 Annex G (informative) Memory Organisation for Secure UHF Tags (Proposal)
G.1 General
G.2 The Public Key storage buffer
86 G.3 Sector Selection
87 G.4 Structure of a Secure Memory Sector
88 G.5 Record Access and Addressing
G.6 Access Bit Mapping
G.7 Minimum Accessible Data Unit
89 Annex H (informative) Bibliography
BSI 15/30302199 DC
$13.70