• There are no items in your cart

ISO/IEC 29167-11:2014

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

Information technology — Automatic identification and data capture techniques — Part 11: Crypto suite PRESENT-80 security services for air interface communications

Available format(s)

Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users

Superseded date

20-02-2023

Superseded by

ISO/IEC 29167-11:2023

Language(s)

English

Published date

22-07-2014

€60.00
Excluding VAT

ISO/IEC 29167-11:2014 defines the crypto suite for PRESENT-80 for the ISO/IEC 18000 air interface standards for radio frequency identification (RFID) devices. The crypto suite is defined in alignment with existing air interfaces. Its purpose is to provide a common crypto suite for security for RFID devices that may be referred by ISO committees for air interface standards and application standards.

PRESENT-80 is a symmetric block cipher that can process data blocks of 64 bits, using a key length of 80 bits. ISO/IEC 29167-11:2014 defines various authentication methods and methods of use for the cipher. A Tag and an Interrogator may support one, a subset, or all of the specified options, clearly stating what is supported.

DocumentType
Standard
Pages
14
PublisherName
International Organization for Standardization
Status
Superseded
SupersededBy

Standards Relationship
DS ISO/IEC 29167-11 : 2014 Identical
NEN ISO/IEC 29167-11 : 2014 Identical
CSA ISO/IEC 29167-11:20 Identical

18/30357579 DC : 0 BS ISO/IEC 19823-19 - INFORMATION TECHNOLOGY - CONFORMANCE TEST METHODS FOR SECURITY SERVICE CRYPTO SUITES - PART 19: CRYPTO SUITE RAMON

ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
ISO/IEC 29192-2:2012 Information technology Security techniques Lightweight cryptography Part 2: Block ciphers
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
ISO/IEC 29167-1:2014 Information technology Automatic identification and data capture techniques Part 1: Security services for RFID air interfaces
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
ISO/IEC 18000-63:2015 Information technology Radio frequency identification for item management Part 63: Parameters for air interface communications at 860 MHz to 960 MHz Type C

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.