{"id":349814,"date":"2024-10-20T00:38:49","date_gmt":"2024-10-20T00:38:49","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-15-30302199-dc\/"},"modified":"2024-10-26T00:22:27","modified_gmt":"2024-10-26T00:22:27","slug":"bsi-15-30302199-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-15-30302199-dc\/","title":{"rendered":"BSI 15\/30302199 DC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | 30302199 <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | file Foreword <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1 Scope 2 Conformance 2.1 Claiming conformance 2.2 Interrogator conformance and obligations 2.3 Tag conformance and obligations <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 3 Normative references 4 Terms and definitions 4.1 Authentication 4.2 CHI1, CHI2 4.3 CHT <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4.4 Confidentiality 4.5 DEC(key, data) 4.6 ENC(key, data) 4.7 IID 4.8 IV 4.9 Integrity 4.10 KE 4.11 KD 4.12 KV 4.13 KS 4.14 KENC <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4.15 KMAC 4.16 KESel 4.17 KSel 4.18 MAC(key, data) 4.19 MAMx,y 4.20 MIX(CH, RN, SID) 4.21 Non-traceability 4.22 R 4.23 RM_ENC(key, data) 4.24 RM_DEC(key, data) 4.25 RNT <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4.26 Secure communication 4.27 SENC 4.28 SMAC 4.29 SID 4.30 SSC 4.31 TAMx,y 5 Symbols and abbreviated terms 5.1 Symbols 5.2 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.3 Notation <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6 Crypto suite introduction 6.1 Overview <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.2 Authentication protocols 6.2.1 Tag Identification 6.2.2 Symmetric mutual authentication <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 6.3 Send Sequence Counter 6.4 Session key derivation 6.4.1 KDF in counter mode <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.4.2 Key Derivation Scheme <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.5 IID, SID, Used Keys and Their Personalisation <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.6 Key table <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 7 Parameter definitions <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 8 Initialization and resetting 9 State diagrams 9.1 General <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 9.2 State diagram and transitions for Tag identification <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 9.2.1 Partial Result Mode <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 9.2.2 Complete Result Mode 9.3 State diagram and transitions for mutual authentication 9.3.1 Partial Result Mode <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 9.3.2 Complete Result Mode <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 9.3.3 Combination of complete and partial result mode 10 Identification and Authentication 10.1 Tag identification 10.1.1 Partial Result Mode 10.1.2 Complete Result Mode <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 10.2 Mutual authentication 10.2.1 Partial Result Mode <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 10.2.2 Complete Result Mode <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 10.3 The Authenticate command 10.3.1 Message formats for Tag identification <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 10.3.1.1 Message format for RAMON memory read (optional) 10.3.2 Message formats for Mutual Authentication <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 10.4 Authentication response 10.4.1 Response formats for Tag identification 10.4.1.1 Partial Result Mode <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 10.4.1.2 Complete Result Mode 10.4.2 Response formats for mutual authentication <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 10.4.2.1 Partial Result Mode <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 10.4.2.2 Complete Result Mode 10.4.3 Authentication error response <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 10.5 Determination of Result Modes <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 11 Secure communication 11.1 Secure communication command <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 11.2 Secure Communication response 11.2.1 Secure communication error response 11.3 Encoding of Read and Write commands for secure communication <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 11.4 Application of secure messaging primitives 11.4.1 Secure Communication command messages <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 11.4.2 Secure Communication response messages <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 11.4.3 Explanation of cipher block chaining mode <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | Annex A (normative) State transition tables <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | Annex B (normative) Error codes and error handling <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | Annex C (normative) Cipher description C.1 Tag Identification Cryptogram Preparation <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | C.1.1 RAMON Memory Read \u2013 Cryptogram Preparation <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | C.1.2 Additional Data fields <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | C.2 The MIX function <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | C.3 Rabin-Montgomery Encryption <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | C.4 Rabin-Montgomery Decryption C.5 Definition of the Montgomery Residue C.6 The inverse MIX Function MIXP-1 <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | C.7 Padding for Symmetric Encryption C.8 Coding Examples C.8.1 Ramon Encryption <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | C.8.2 Ramon Decryption <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | Annex D (informative) Test Vectors D.1 Notation D.2 RAMON Keys D.3 The Authentication Message <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | D.4 RAMON Encryption D.5 Montgomery Reduction and Decryption <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | Annex E (normative) Protocol specific E.1 General E.1.1 Supported Security Services <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | E.2 Security Services for ISO\/IEC 18000-3 mode 1 E.3 Security Services for ISO\/IEC 18000-3 mode 3 E.4 Security Services for ISO\/IEC 18000-4 mode 4 E.5 Security Services for ISO\/IEC 18000-63 E.5.1 Tag Identification and memory read using the air interface Challenge command <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | E.6 Communication example (informative) E.6.1 Tag identification sequence in Partial Result Mode <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | E.6.2 Tag identification sequence in Complete Result Mod <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | E.6.3 Mutual authentication sequence <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | E.6.4 Secure Read and Write communication sequence <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | E.7 Implementation of CS error conditions E.7.1 Implementation of CS error conditions in ISO\/IEC 18000-3 Mode-1 E.7.2 Implementation of CS error conditions in ISO\/IEC 18000-3 Mode-3 E.7.3 Implementation of CS error conditions in ISO\/IEC 18000-4 Mode-4 E.7.4 Implementation of CS error conditions in ISO\/IEC 18000-63 <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | Annex F (informative) Non-traceable and integrity-protected Tag identification F.1 Enabling non-traceability for ISO\/IEC 18000-63 UHF Tags F.1.1 EPC Memory <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | F.1.2 TID Memory F.1.3 Using ‘EPC coded’ SID to restore randomized SGIN and MCS <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | F.2 Enabling non-traceability for ISO\/IEC 18000-3M1 HF Tags F.3 Signatures for integrity-protection of the SID <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | Annex G (informative) Memory Organisation for Secure UHF Tags (Proposal) G.1 General G.2 The Public Key storage buffer <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | G.3 Sector Selection <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | G.4 Structure of a Secure Memory Sector <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | G.5 Record Access and Addressing G.6 Access Bit Mapping G.7 Minimum Accessible Data Unit <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | Annex H (informative) Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO\/IEC 29167-19. Information technology. Automatic identification and data capture techniques. Part 19. Air Interface for security services crypto suite RAMON<\/b><\/p>\n |