• ISO/IEC 29167-11:2014

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    Information technology — Automatic identification and data capture techniques — Part 11: Crypto suite PRESENT-80 security services for air interface communications

    Available format(s):  Hardcopy, PDF, PDF 3 Users, PDF 5 Users, PDF 9 Users

    Superseded date:  20-02-2023

    Language(s):  English

    Published date:  22-07-2014

    Publisher:  International Organization for Standardization

    Add To Cart

    Abstract - (Show below) - (Hide below)

    ISO/IEC 29167-11:2014 defines the crypto suite for PRESENT-80 for the ISO/IEC 18000 air interface standards for radio frequency identification (RFID) devices. The crypto suite is defined in alignment with existing air interfaces. Its purpose is to provide a common crypto suite for security for RFID devices that may be referred by ISO committees for air interface standards and application standards.

    PRESENT-80 is a symmetric block cipher that can process data blocks of 64 bits, using a key length of 80 bits. ISO/IEC 29167-11:2014 defines various authentication methods and methods of use for the cipher. A Tag and an Interrogator may support one, a subset, or all of the specified options, clearly stating what is supported.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Publisher International Organization for Standardization
    Status Superseded
    Superseded By

    Standards Referenced By This Book - (Show below) - (Hide below)

    18/30357579 DC : 0 BS ISO/IEC 19823-19 - INFORMATION TECHNOLOGY - CONFORMANCE TEST METHODS FOR SECURITY SERVICE CRYPTO SUITES - PART 19: CRYPTO SUITE RAMON

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
    ISO/IEC 29192-2:2012 Information technology Security techniques Lightweight cryptography Part 2: Block ciphers
    ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
    ISO/IEC 29167-1:2014 Information technology Automatic identification and data capture techniques Part 1: Security services for RFID air interfaces
    ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
    ISO/IEC 18000-63:2015 Information technology Radio frequency identification for item management Part 63: Parameters for air interface communications at 860 MHz to 960 MHz Type C
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective