{"id":231367,"date":"2024-10-19T15:04:11","date_gmt":"2024-10-19T15:04:11","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-ts-21219-242017\/"},"modified":"2024-10-25T09:23:29","modified_gmt":"2024-10-25T09:23:29","slug":"bsi-pd-iso-ts-21219-242017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-ts-21219-242017\/","title":{"rendered":"BSI PD ISO\/TS 21219-24:2017"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5 Light Encryption specific constraints 5.1 Version number signalling 5.2 Extendibility 5.3 Endianness 5.4 Supported business models <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.5 Performance requirements 5.5.1 Repetition rate of light encryption parameters 5.5.2 Update rate of light encryption parameters 5.6 License agreement and security requirements 5.6.1 General <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.6.2 Security requirements on service providers 5.6.3 Security requirements on client manufacturers 6 Light encryption method of encryption and operation 6.1 Principles of operation for light encryption <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.2 Overview of the light encryption method 6.2.1 General <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.2.2 TISA secret KeyTable and TISAparameterInConfidence <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.3 Encryption and decryption of service data frame payload data 6.3.1 General 6.3.2 Block cipher mode of operation <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.3.3 Initialisation Vector 6.4 Encryption and decryption of transmitted Control Words <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.5 Service Key composition 6.5.1 General <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.5.2 Light Encryption modes 1 and 2 common parameters for Service Key composition <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6.5.3 Light Encryption Mode 1 specific parameters for Service Key composition 6.5.4 Light Encryption Mode 2 specific parameters for Service Key composition 6.5.5 Example Service Key Composition <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 7 Light Encryption structure and embedding in TPEG service data frames 7.1 General 7.2 Light encryption embedding in TPEG service data frames 7.3 Light Encryption components <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.4 LTE tables 7.5 Initialisation Vector composition 7.6 Service Key composition <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 8 LTE components 8.1 LteInformation 8.2 LteParameters <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 8.3 LteMode1Parameters 8.4 LteMode2Parameters <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 8.5 Mode1EMMessage 8.6 Mode2EMMessage <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 9 LTE Datatypes 9.1 ControlWord 9.2 Nonce <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 10 LTE Tables 10.1 lte001:\u200bLightEncryptionMode <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Annex\u00a0A (normative) TPEG application, TPEG-Binary Representation <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | Annex\u00a0B (normative) TPEG application, TPEG-ML Representation <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | Annex\u00a0C (informative) Light Encryption Guidelines <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Intelligent transport systems. Traffic and travel information (TTI) via transport protocol experts group, generation 2 (TPEG2) – Light encryption (TPEG2-LTE)<\/b><\/p>\n |