{"id":349558,"date":"2024-10-20T00:37:23","date_gmt":"2024-10-20T00:37:23","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-14-30275432-dc\/"},"modified":"2024-10-26T00:19:12","modified_gmt":"2024-10-26T00:19:12","slug":"bsi-14-30275432-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-14-30275432-dc\/","title":{"rendered":"BSI 14\/30275432 DC"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
7<\/td>\nForeword
\uf0be Part 1: Security services for RFID air interfaces <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Conformance
2.1 Air interface protocol specific information
2.2 Interrogator conformance and obligations
2.3 Tag conformance and obligations <\/td>\n<\/tr>\n
10<\/td>\n3 Normative references
4 Terms and definitions
4.1
AES-CBC-ENC(IV, key, data)
AES data encryption (forward operation) in CBC mode of input data \u2018data\u2019, using initialization vector IV and 128 bit cryptographic key \u2018key\u2019
4.2
AES-ECB-ENC(key, data)
AES data encryption (forward operation) in ECB mode of input data \u2018data\u2019, using 128 bit cryptographic key \u2018key\u2019
4.3
AES-CMAC-96(key, data)
CMAC generation using AES in forward operation with 128 bit cryptographic key \u2018key\u2019 of input data \u2018data\u2019, truncating the result by using only the 96 most significant bits from the 128-bit CMAC code
4.4
Bit String
Ordered sequence of 0\u2019s and 1\u2019s
4.5
Block Cipher
4.6
Block Size
Number of bits in an input (or output) block of the block cipher <\/td>\n<\/tr>\n
11<\/td>\n4.7
Cryptographic Key
4.8
CMAC
Cipher-based MAC algorithm based on a symmetric key block cipher. See MAC method 5 in [1] for a normative reference
4.9
Command (Message)
Data that Interrogator sends to Tag with “Message” as parameter
4.10
D
Number of additional 128-bit blocks with custom data that may be added to the Tag authentication response
4.11
Data Block (Block)
Sequence of bits whose length is the block size of the block cipher
4.12
Initialization Vector
Data block that some modes of operation require as an additional initial input
4.13
Input Block
Data that is an input to either the forward cipher function or the inverse cipher function of the block cipher algorithm
4.14
Key
String of bits used by a cryptographic algorithm to transform plain text into cipher text or vice versa or to produce a message authentication code
4.15
KeyID
Numerical designator for a single key
4.16
Key[KeyID].ENC_key
Key that shall be used for encryption
4.17
Key[KeyID].MAC_key
Key that may be used for cryptographic integrity protection
4.18
MAC_key
Variable that shall contain the key that will be used for cryptographic integrity protection
4.19
Memory Profile
Start pointer within the Tag’s memory for addressing custom data block
4.20
Message
Part of the Command that is defined by the crypto suite <\/td>\n<\/tr>\n
12<\/td>\n4.21
Mode of Operation (Mode)
Algorithm for the cryptographic transformation of data that features a symmetric key block cipher algorithm
4.22
Output Block
Data that is an output of either the forward cipher function or the inverse cipher function of the block cipher algorithm
4.23
Plaintext
Usable data that is formatted as input to a mode
4.24
Reply (Response)
Data that Tag returns to the Interrogator with “Response” as parameter
4.25
Response
Part of the Reply (stored or sent) that is defined by the crypto suite
4.26
Word
Bit string comprised of 16 bits.
5 Symbols and abbreviated terms
5.1 Symbols
5.2 Abbreviated terms <\/td>\n<\/tr>\n
13<\/td>\n6 Introduction of the AES-128 crypto suite
7 Parameter definitions
Table 1 \u2014 Definition of AES-128 crypto suite parameters <\/td>\n<\/tr>\n
14<\/td>\n8 Crypto Suite state Diagram
Figure 1 \u2014 Crypto suite Tag state diagram
9 Initialization and resetting
10 Authentication
10.1 Introduction
Table 2 \u2014message and response functions
10.2 Message and Response formatting <\/td>\n<\/tr>\n
15<\/td>\nIf AuthMethod = “00b” the Tag shall parse Message as described in section 10.3
10.3 Tag authentication (Method \u201c00\u201d = TAM)
Figure 2 \u2013 Tag authentication
If CustomData = “0b” the Tag shall parse the TAM1 Message as described in section 10.3.1
If CustomData = “1b” the Tag shall parse the TAM2 Message as described in section 10.3.4
10.3.1 TAM1 Message <\/td>\n<\/tr>\n
16<\/td>\nTable 3 \u2014 TAM1 Message format
10.3.2 TAM1 Response
Table 4 \u2014 Response if optional fields have not been used
10.3.3 Final Interrogator processing TAM1
10.3.4 TAM2 Message <\/td>\n<\/tr>\n
17<\/td>\nTable 5 \u2014 Supported modes of operation for ProtMode <\/td>\n<\/tr>\n
18<\/td>\nTable 6 \u2014 TAM2 Message format <\/td>\n<\/tr>\n
19<\/td>\n10.3.5 TAM2 Response
10.3.5.1 Response if ProtMode = “0000b”: Plaintext
Table 7 \u2014 Response if ProtMode = “0000b”: Plain text
10.3.5.2 Response if ProtMode = “0001b”: CBC encipherment only <\/td>\n<\/tr>\n
20<\/td>\nTable 8 \u2014 Response if ProtMode = “0001b”: CBC encipherment only
10.3.5.3 Response if ProtMode = “0010b”: CMAC message authentication only
Table 9 \u2014 Response if ProtMode = “0010b”: CMAC message authentication only
10.3.5.4 Response if ProtMode = “0011b”: CBC encipherment with CMAC message authentication <\/td>\n<\/tr>\n
21<\/td>\nTable 10 \u2014 Response if ProtMode = “0011b”: CBC encipherment with CMAC message authentication
10.3.6 Final Interrogator processing TAM2
11 Communication
12 Key Table <\/td>\n<\/tr>\n
22<\/td>\nTable 11 \u2014 Link of MPI bits with memory profiles
Table 12 \u2014 Key Management Table <\/td>\n<\/tr>\n
23<\/td>\nAnnex A (normative) Crypto Suite State transition tables
Table A.1 \u2014 Crypto Suite State transition table <\/td>\n<\/tr>\n
24<\/td>\nAnnex B (normative) Error conditions and error handling
Table B.1 \u2014 Error conditions <\/td>\n<\/tr>\n
25<\/td>\nAnnex C (normative) Cipher description <\/td>\n<\/tr>\n
26<\/td>\nAnnex D (informative) Test vectors
D.1 References for AES test vectors
D.1.1 Test vectors for the AES algorithm
D.1.2 online AES calculator <\/td>\n<\/tr>\n
27<\/td>\nAnnex E (normative) Protocol specific information
E.1 General
Figure E.1\u2014 Message exchange for Tag authentication
E.1.1 Supported Security Services
Table E.1 \u2014 Security Services <\/td>\n<\/tr>\n
28<\/td>\nE.2 Security Services for ISO\/IEC 18000-3 mode 1
E.3 Security Services for ISO\/IEC 18000-3 mode 3
E.4 Security Services for ISO\/IEC 18000-63
E.4.1 ISO\/IEC 18000-63 Protocol Commands <\/td>\n<\/tr>\n
29<\/td>\nE.4.2 Security commands in ISO\/IEC 18000-63
E.4.3 Implementation of crypto suite error conditions in ISO\/IEC 18000-63
Table E.2 \u2014 Implementation of crypto suite error conditions as Tag error codes
E.4.4 Key Properties
E.4.5 Memory profiles
Table E.3 \u2014 Description of ISO\/IEC 18000-63 specific memory profiles for Profile <\/td>\n<\/tr>\n
30<\/td>\nE.4.6 Interaction with Untraceability feature <\/td>\n<\/tr>\n
31<\/td>\nAnnex F (Informative) Examples
F.1 General
F.2 Assumed content of the Tag’s Key Management Table and memory profile
F.2.1 Content of Key Management Table
F.2.2 Memory profile configuration <\/td>\n<\/tr>\n
32<\/td>\nF.3 Example for TAM1
Table F.3 \u2014 Example TAM1 Message
Table F.4 \u2014 TAM1 Response
F.4 Examples for TAM2
F.4.1 Example 1
Table F.5 \u2014 TAM2 Message \u2013 example 1 <\/td>\n<\/tr>\n
33<\/td>\nTable F.6 \u2014 TAM2 Response \u2013 example 1
F.4.2 Example 2
Table F.7 \u2014 TAM2 Message \u2013 example 2
Table F.8 \u2014 TAM2 Response \u2013 example 2 <\/td>\n<\/tr>\n
34<\/td>\nF.4.3 Example 3 <\/td>\n<\/tr>\n
35<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS ISO\/IEC 29167-10. Information technology. Automatic identification and data capture techniques. Part 10. Crypto suite AES-128 security services for air interface communications<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2014<\/td>\n35<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":349565,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[662,2641],"product_tag":[],"class_list":{"0":"post-349558","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-040-50","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/349558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/349565"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=349558"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=349558"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=349558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}