{"id":425620,"date":"2024-10-20T06:57:49","date_gmt":"2024-10-20T06:57:49","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-29167-112023\/"},"modified":"2024-10-26T13:08:13","modified_gmt":"2024-10-26T13:08:13","slug":"bs-iso-iec-29167-112023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-29167-112023\/","title":{"rendered":"BS ISO\/IEC 29167-11:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms, definitions, symbols and abbreviated terms 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 3.2 Symbols <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 3.3 Abbreviated terms 4 Conformance 4.1 Air interface protocol specific information 4.2 Interrogator conformance and requirements 4.3 Tag conformance and requirements <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5 Introduction of the PRESENT-80 cryptographic suite 6 Parameter and variable definitions 7 Crypto suite state diagram <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 8 Initialization and resetting 9 Authentication 9.1 Introduction 9.2 Message and response formatting <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 9.3 Tag authentication: AuthMethod \u201c00\u201d 9.3.1 General 9.3.2 TAM1 message <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 9.3.3 Intermediate Tag processing <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 9.3.4 TAM1 response 9.3.5 Final Interrogator processing <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 9.4 Interrogator authentication: AuthMethod \u201c01\u201d 9.4.1 General 9.4.2 IAM1 message 9.4.3 Intermediate Tag processing #1 <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 9.4.4 IAM1 response 9.4.5 Intermediate Interrogator processing 9.4.6 IAM2 message 9.4.7 Intermediate Tag processing #2 <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 9.4.8 IAM2 response 9.4.9 Final Interrogator processing 9.5 Mutual authentication: AuthMethod \u201c10\u201d 9.5.1 General <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 9.5.2 MAM1 message 9.5.3 Intermediate Tag processing #1 9.5.4 MAM1 response <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 9.5.5 Intermediate Interrogator processing 9.5.6 MAM2 message 9.5.7 Intermediate Tag processing #2 <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 9.5.8 MAM2 response 9.5.9 Final Interrogator processing 10 Communication 11 Key table and Key update <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Annex A (normative) Crypto suite state transition table <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Annex B (normative) Errors and error handling <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Annex C (informative) Description of PRESENT <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Annex D (informative) Test vectors <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Annex E (normative) Protocol specific information <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Automatic identification and data capture techniques – Crypto suite PRESENT-80 security services for air interface communications<\/b><\/p>\n |