Already a subscriber?
MADCAD.com Free Trial
Sign up for a 3 day free trial to explore the MADCAD.com interface, PLUS access the
2009 International Building Code to see how it all works.
If you like to setup a quick demo, let us know at support@madcad.com
or +1 800.798.9296 and we will be happy to schedule a webinar for you.
Security check
Please login to your personal account to use this feature.
Please login to your authorized staff account to use this feature.
Are you sure you want to empty the cart?
15/30302199 DC BS ISO/IEC 29167-19. Information technology. Automatic identification and data capture techniques. Part 19. Air Interface for security services crypto suite RAMON, 2015
- 30302199
- file [Go to Page]
- Foreword
- Introduction
- 1 Scope
- 2 Conformance [Go to Page]
- 2.1 Claiming conformance
- 2.2 Interrogator conformance and obligations
- 2.3 Tag conformance and obligations
- 3 Normative references
- 4 Terms and definitions [Go to Page]
- 4.1 Authentication
- 4.2 CHI1, CHI2
- 4.3 CHT
- 4.4 Confidentiality
- 4.5 DEC(key, data)
- 4.6 ENC(key, data)
- 4.7 IID
- 4.8 IV
- 4.9 Integrity
- 4.10 KE
- 4.11 KD
- 4.12 KV
- 4.13 KS
- 4.14 KENC
- 4.15 KMAC
- 4.16 KESel
- 4.17 KSel
- 4.18 MAC(key, data)
- 4.19 MAMx,y
- 4.20 MIX(CH, RN, SID)
- 4.21 Non-traceability
- 4.22 R
- 4.23 RM_ENC(key, data)
- 4.24 RM_DEC(key, data)
- 4.25 RNT
- 4.26 Secure communication
- 4.27 SENC
- 4.28 SMAC
- 4.29 SID
- 4.30 SSC
- 4.31 TAMx,y
- 5 Symbols and abbreviated terms [Go to Page]
- 5.1 Symbols
- 5.2 Abbreviated terms
- 5.3 Notation
- 6 Crypto suite introduction [Go to Page]
- 6.1 Overview
- 6.2 Authentication protocols [Go to Page]
- 6.2.1 Tag Identification
- 6.2.2 Symmetric mutual authentication
- 6.3 Send Sequence Counter
- 6.4 Session key derivation [Go to Page]
- 6.4.1 KDF in counter mode
- 6.4.2 Key Derivation Scheme
- 6.5 IID, SID, Used Keys and Their Personalisation
- 6.6 Key table
- 7 Parameter definitions
- 8 Initialization and resetting
- 9 State diagrams [Go to Page]
- 9.1 General
- 9.2 State diagram and transitions for Tag identification [Go to Page]
- 9.2.1 Partial Result Mode
- 9.2.2 Complete Result Mode
- 9.3 State diagram and transitions for mutual authentication [Go to Page]
- 9.3.1 Partial Result Mode
- 9.3.2 Complete Result Mode
- 9.3.3 Combination of complete and partial result mode
- 10 Identification and Authentication [Go to Page]
- 10.1 Tag identification [Go to Page]
- 10.1.1 Partial Result Mode
- 10.1.2 Complete Result Mode
- 10.2 Mutual authentication [Go to Page]
- 10.2.1 Partial Result Mode
- 10.2.2 Complete Result Mode
- 10.3 The Authenticate command [Go to Page]
- 10.3.1 Message formats for Tag identification [Go to Page]
- 10.3.1.1 Message format for RAMON memory read (optional)
- 10.3.2 Message formats for Mutual Authentication
- 10.4 Authentication response [Go to Page]
- 10.4.1 Response formats for Tag identification [Go to Page]
- 10.4.1.1 Partial Result Mode
- 10.4.1.2 Complete Result Mode
- 10.4.2 Response formats for mutual authentication [Go to Page]
- 10.4.2.1 Partial Result Mode
- 10.4.2.2 Complete Result Mode
- 10.4.3 Authentication error response
- 10.5 Determination of Result Modes
- 11 Secure communication [Go to Page]
- 11.1 Secure communication command
- 11.2 Secure Communication response [Go to Page]
- 11.2.1 Secure communication error response
- 11.3 Encoding of Read and Write commands for secure communication
- 11.4 Application of secure messaging primitives [Go to Page]
- 11.4.1 Secure Communication command messages
- 11.4.2 Secure Communication response messages
- 11.4.3 Explanation of cipher block chaining mode
- Annex A (normative) State transition tables
- Annex B (normative) Error codes and error handling
- Annex C (normative) Cipher description [Go to Page]
- C.1 Tag Identification Cryptogram Preparation [Go to Page]
- C.1.1 RAMON Memory Read – Cryptogram Preparation
- C.1.2 Additional Data fields
- C.2 The MIX function
- C.3 Rabin-Montgomery Encryption
- C.4 Rabin-Montgomery Decryption
- C.5 Definition of the Montgomery Residue
- C.6 The inverse MIX Function MIXP-1
- C.7 Padding for Symmetric Encryption
- C.8 Coding Examples [Go to Page]
- C.8.1 Ramon Encryption
- C.8.2 Ramon Decryption
- Annex D (informative) Test Vectors [Go to Page]
- D.1 Notation
- D.2 RAMON Keys
- D.3 The Authentication Message
- D.4 RAMON Encryption
- D.5 Montgomery Reduction and Decryption
- Annex E (normative) Protocol specific [Go to Page]
- E.1 General [Go to Page]
- E.1.1 Supported Security Services
- E.2 Security Services for ISO/IEC 18000-3 mode 1
- E.3 Security Services for ISO/IEC 18000-3 mode 3
- E.4 Security Services for ISO/IEC 18000-4 mode 4
- E.5 Security Services for ISO/IEC 18000-63 [Go to Page]
- E.5.1 Tag Identification and memory read using the air interface Challenge command
- E.6 Communication example (informative) [Go to Page]
- E.6.1 Tag identification sequence in Partial Result Mode
- E.6.2 Tag identification sequence in Complete Result Mod
- E.6.3 Mutual authentication sequence
- E.6.4 Secure Read and Write communication sequence
- E.7 Implementation of CS error conditions [Go to Page]
- E.7.1 Implementation of CS error conditions in ISO/IEC 18000-3 Mode-1
- E.7.2 Implementation of CS error conditions in ISO/IEC 18000-3 Mode-3
- E.7.3 Implementation of CS error conditions in ISO/IEC 18000-4 Mode-4
- E.7.4 Implementation of CS error conditions in ISO/IEC 18000-63
- Annex F (informative) Non-traceable and integrity-protected Tag identification [Go to Page]
- F.1 Enabling non-traceability for ISO/IEC 18000-63 UHF Tags [Go to Page]
- F.1.1 EPC Memory
- F.1.2 TID Memory
- F.1.3 Using 'EPC coded' SID to restore randomized SGIN and MCS
- F.2 Enabling non-traceability for ISO/IEC 18000-3M1 HF Tags
- F.3 Signatures for integrity-protection of the SID
- Annex G (informative) Memory Organisation for Secure UHF Tags (Proposal) [Go to Page]
- G.1 General
- G.2 The Public Key storage buffer
- G.3 Sector Selection
- G.4 Structure of a Secure Memory Sector
- G.5 Record Access and Addressing
- G.6 Access Bit Mapping
- G.7 Minimum Accessible Data Unit
- Annex H (informative) Bibliography [Go to Page]