{"id":349814,"date":"2024-10-20T00:38:49","date_gmt":"2024-10-20T00:38:49","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-15-30302199-dc\/"},"modified":"2024-10-26T00:22:27","modified_gmt":"2024-10-26T00:22:27","slug":"bsi-15-30302199-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-15-30302199-dc\/","title":{"rendered":"BSI 15\/30302199 DC"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\n30302199 <\/td>\n<\/tr>\n
8<\/td>\nfile
Foreword <\/td>\n<\/tr>\n
9<\/td>\nIntroduction <\/td>\n<\/tr>\n
11<\/td>\n1 Scope
2 Conformance
2.1 Claiming conformance
2.2 Interrogator conformance and obligations
2.3 Tag conformance and obligations <\/td>\n<\/tr>\n
12<\/td>\n3 Normative references
4 Terms and definitions
4.1 Authentication
4.2 CHI1, CHI2
4.3 CHT <\/td>\n<\/tr>\n
13<\/td>\n4.4 Confidentiality
4.5 DEC(key, data)
4.6 ENC(key, data)
4.7 IID
4.8 IV
4.9 Integrity
4.10 KE
4.11 KD
4.12 KV
4.13 KS
4.14 KENC <\/td>\n<\/tr>\n
14<\/td>\n4.15 KMAC
4.16 KESel
4.17 KSel
4.18 MAC(key, data)
4.19 MAMx,y
4.20 MIX(CH, RN, SID)
4.21 Non-traceability
4.22 R
4.23 RM_ENC(key, data)
4.24 RM_DEC(key, data)
4.25 RNT <\/td>\n<\/tr>\n
15<\/td>\n4.26 Secure communication
4.27 SENC
4.28 SMAC
4.29 SID
4.30 SSC
4.31 TAMx,y
5 Symbols and abbreviated terms
5.1 Symbols
5.2 Abbreviated terms <\/td>\n<\/tr>\n
16<\/td>\n5.3 Notation <\/td>\n<\/tr>\n
17<\/td>\n6 Crypto suite introduction
6.1 Overview <\/td>\n<\/tr>\n
18<\/td>\n6.2 Authentication protocols
6.2.1 Tag Identification
6.2.2 Symmetric mutual authentication <\/td>\n<\/tr>\n
20<\/td>\n6.3 Send Sequence Counter
6.4 Session key derivation
6.4.1 KDF in counter mode <\/td>\n<\/tr>\n
21<\/td>\n6.4.2 Key Derivation Scheme <\/td>\n<\/tr>\n
22<\/td>\n6.5 IID, SID, Used Keys and Their Personalisation <\/td>\n<\/tr>\n
23<\/td>\n6.6 Key table <\/td>\n<\/tr>\n
24<\/td>\n7 Parameter definitions <\/td>\n<\/tr>\n
25<\/td>\n8 Initialization and resetting
9 State diagrams
9.1 General <\/td>\n<\/tr>\n
26<\/td>\n9.2 State diagram and transitions for Tag identification <\/td>\n<\/tr>\n
27<\/td>\n9.2.1 Partial Result Mode <\/td>\n<\/tr>\n
28<\/td>\n9.2.2 Complete Result Mode
9.3 State diagram and transitions for mutual authentication
9.3.1 Partial Result Mode <\/td>\n<\/tr>\n
31<\/td>\n9.3.2 Complete Result Mode <\/td>\n<\/tr>\n
32<\/td>\n9.3.3 Combination of complete and partial result mode
10 Identification and Authentication
10.1 Tag identification
10.1.1 Partial Result Mode
10.1.2 Complete Result Mode <\/td>\n<\/tr>\n
33<\/td>\n10.2 Mutual authentication
10.2.1 Partial Result Mode <\/td>\n<\/tr>\n
34<\/td>\n10.2.2 Complete Result Mode <\/td>\n<\/tr>\n
35<\/td>\n10.3 The Authenticate command
10.3.1 Message formats for Tag identification <\/td>\n<\/tr>\n
36<\/td>\n10.3.1.1 Message format for RAMON memory read (optional)
10.3.2 Message formats for Mutual Authentication <\/td>\n<\/tr>\n
37<\/td>\n10.4 Authentication response
10.4.1 Response formats for Tag identification
10.4.1.1 Partial Result Mode <\/td>\n<\/tr>\n
38<\/td>\n10.4.1.2 Complete Result Mode
10.4.2 Response formats for mutual authentication <\/td>\n<\/tr>\n
39<\/td>\n10.4.2.1 Partial Result Mode <\/td>\n<\/tr>\n
40<\/td>\n10.4.2.2 Complete Result Mode
10.4.3 Authentication error response <\/td>\n<\/tr>\n
41<\/td>\n10.5 Determination of Result Modes <\/td>\n<\/tr>\n
42<\/td>\n11 Secure communication
11.1 Secure communication command <\/td>\n<\/tr>\n
43<\/td>\n11.2 Secure Communication response
11.2.1 Secure communication error response
11.3 Encoding of Read and Write commands for secure communication <\/td>\n<\/tr>\n
44<\/td>\n11.4 Application of secure messaging primitives
11.4.1 Secure Communication command messages <\/td>\n<\/tr>\n
46<\/td>\n11.4.2 Secure Communication response messages <\/td>\n<\/tr>\n
48<\/td>\n11.4.3 Explanation of cipher block chaining mode <\/td>\n<\/tr>\n
50<\/td>\nAnnex A (normative) State transition tables <\/td>\n<\/tr>\n
54<\/td>\nAnnex B (normative) Error codes and error handling <\/td>\n<\/tr>\n
55<\/td>\nAnnex C (normative) Cipher description
C.1 Tag Identification Cryptogram Preparation <\/td>\n<\/tr>\n
56<\/td>\nC.1.1 RAMON Memory Read \u2013 Cryptogram Preparation <\/td>\n<\/tr>\n
57<\/td>\nC.1.2 Additional Data fields <\/td>\n<\/tr>\n
58<\/td>\nC.2 The MIX function <\/td>\n<\/tr>\n
62<\/td>\nC.3 Rabin-Montgomery Encryption <\/td>\n<\/tr>\n
63<\/td>\nC.4 Rabin-Montgomery Decryption
C.5 Definition of the Montgomery Residue
C.6 The inverse MIX Function MIXP-1 <\/td>\n<\/tr>\n
64<\/td>\nC.7 Padding for Symmetric Encryption
C.8 Coding Examples
C.8.1 Ramon Encryption <\/td>\n<\/tr>\n
68<\/td>\nC.8.2 Ramon Decryption <\/td>\n<\/tr>\n
72<\/td>\nAnnex D (informative) Test Vectors
D.1 Notation
D.2 RAMON Keys
D.3 The Authentication Message <\/td>\n<\/tr>\n
73<\/td>\nD.4 RAMON Encryption
D.5 Montgomery Reduction and Decryption <\/td>\n<\/tr>\n
75<\/td>\nAnnex E (normative) Protocol specific
E.1 General
E.1.1 Supported Security Services <\/td>\n<\/tr>\n
76<\/td>\nE.2 Security Services for ISO\/IEC 18000-3 mode 1
E.3 Security Services for ISO\/IEC 18000-3 mode 3
E.4 Security Services for ISO\/IEC 18000-4 mode 4
E.5 Security Services for ISO\/IEC 18000-63
E.5.1 Tag Identification and memory read using the air interface Challenge command <\/td>\n<\/tr>\n
77<\/td>\nE.6 Communication example (informative)
E.6.1 Tag identification sequence in Partial Result Mode <\/td>\n<\/tr>\n
78<\/td>\nE.6.2 Tag identification sequence in Complete Result Mod <\/td>\n<\/tr>\n
79<\/td>\nE.6.3 Mutual authentication sequence <\/td>\n<\/tr>\n
80<\/td>\nE.6.4 Secure Read and Write communication sequence <\/td>\n<\/tr>\n
81<\/td>\nE.7 Implementation of CS error conditions
E.7.1 Implementation of CS error conditions in ISO\/IEC 18000-3 Mode-1
E.7.2 Implementation of CS error conditions in ISO\/IEC 18000-3 Mode-3
E.7.3 Implementation of CS error conditions in ISO\/IEC 18000-4 Mode-4
E.7.4 Implementation of CS error conditions in ISO\/IEC 18000-63 <\/td>\n<\/tr>\n
82<\/td>\nAnnex F (informative) Non-traceable and integrity-protected Tag identification
F.1 Enabling non-traceability for ISO\/IEC 18000-63 UHF Tags
F.1.1 EPC Memory <\/td>\n<\/tr>\n
83<\/td>\nF.1.2 TID Memory
F.1.3 Using ‘EPC coded’ SID to restore randomized SGIN and MCS <\/td>\n<\/tr>\n
84<\/td>\nF.2 Enabling non-traceability for ISO\/IEC 18000-3M1 HF Tags
F.3 Signatures for integrity-protection of the SID <\/td>\n<\/tr>\n
85<\/td>\nAnnex G (informative) Memory Organisation for Secure UHF Tags (Proposal)
G.1 General
G.2 The Public Key storage buffer <\/td>\n<\/tr>\n
86<\/td>\nG.3 Sector Selection <\/td>\n<\/tr>\n
87<\/td>\nG.4 Structure of a Secure Memory Sector <\/td>\n<\/tr>\n
88<\/td>\nG.5 Record Access and Addressing
G.6 Access Bit Mapping
G.7 Minimum Accessible Data Unit <\/td>\n<\/tr>\n
89<\/td>\nAnnex H (informative) Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS ISO\/IEC 29167-19. Information technology. Automatic identification and data capture techniques. Part 19. Air Interface for security services crypto suite RAMON<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2015<\/td>\n89<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":349816,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[662,2641],"product_tag":[],"class_list":{"0":"post-349814","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-040-50","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/349814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/349816"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=349814"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=349814"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=349814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}