• CAN/CSA-ISO/IEC 29167-16:16

    Current The latest, up-to-date edition.

    Information technology Automatic identification and data capture techniques Part 16: Crypto suite ECDSA-ECDH security services for air interface communications (Adopted ISO/IEC 29167-16:2015, first edition, 2015-11-15)

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date:  01-01-2016

    Publisher:  Canadian Standards Association

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Conformance
    3 Normative references
    4 Terms and definitions
    5 Symbols and abbreviated
    6 Cipher introduction
    7 Parameter definitions
    8 State diagram
    9 Initialization and resetting
    10 Authentication
    11 Communication
    Annex A (normative) - State transition table
    Annex B (normative) - Error codes and error handling
    Annex C (normative) - Cipher description
    Annex D (informative) - Test Vectors
    Annex E (normative) - Protocol specific
    Annex F (normative) - Protocol message's fragmentation
            and defragmentation
    Annex G (informative) - Examples of ECC parameters
    Annex H (normative) - TTP involving

    Abstract - (Show below) - (Hide below)

    This international standard describes a crypto suite based on Elliptic Curve Cryptography (ECC) for the ISO/IEC 18000- series of standards protocol. In particular, it specifies the use of Elliptic Curve Diffie-Hellman (ECDH) key agreement in a secure channel establishment and the use of Elliptic Curve Digital Signature Algorithm (ECDSA) in an authentication mechanism.

    Scope - (Show below) - (Hide below)

    Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). For brevity, this Standard will be referred to as \"CAN/CSA-ISO/IEC 29167-16\" throughout. At the time of publication, ISO/IEC 29167-16:2015 is available from ISO and IEC in English only. CSA Group will publish the French version when it becomes available from ISO and IEC. Scope This international standard describes a crypto suite based on Elliptic Curve Cryptography (ECC) for the ISO/IEC 18000- series of standards protocol. In particular, it specifies the use of Elliptic Curve Diffie-Hellman (ECDH) key agreement in a secure channel establishment and the use of Elliptic Curve Digital Signature Algorithm (ECDSA) in an authentication mechanism. This international standard specifies a crypto suite for ECDSA-ECDH for air interface for RFID systems. The crypto suite is defined in alignment with existing air interfaces. This international standard defines a mutual authentication method and methods of use for the cipher. A Tag and an Interrogator may support one, a subset, or all of the specified options, clearly stating what is supported. Key update is not supported in this international standard.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Publisher Canadian Standards Association
    Status Current

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ISO/IEC 9798-3:1998 Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques
    ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
    ISO/IEC 11770-6:2016 Information technology Security techniques Key management Part 6: Key derivation
    ISO/IEC 29167-1:2014 Information technology Automatic identification and data capture techniques Part 1: Security services for RFID air interfaces
    ISO/IEC 18000-4:2015 Information technology Radio frequency identification for item management Part 4: Parameters for air interface communications at 2,45 GHz
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective