ISO/IEC 29167-11:2014
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology — Automatic identification and data capture techniques — Part 11: Crypto suite PRESENT-80 security services for air interface communications
Hardcopy , PDF
English
22-07-2014
09-04-2025
ISO/IEC 29167-11:2014 defines the crypto suite for PRESENT-80 for the ISO/IEC 18000 air interface standards for radio frequency identification (RFID) devices. The crypto suite is defined in alignment with existing air interfaces. Its purpose is to provide a common crypto suite for security for RFID devices that may be referred by ISO committees for air interface standards and application standards.
PRESENT-80 is a symmetric block cipher that can process data blocks of 64 bits, using a key length of 80 bits. ISO/IEC 29167-11:2014 defines various authentication methods and methods of use for the cipher. A Tag and an Interrogator may support one, a subset, or all of the specified options, clearly stating what is supported.
| Committee |
ISO/IEC JTC 1/SC 31
|
| DocumentType |
Standard
|
| Pages |
14
|
| PublisherName |
International Organization for Standardization
|
| Status |
Withdrawn
|
| SupersededBy |
| Standards | Relationship |
| DS ISO/IEC 29167-11 : 2014 | Identical |
| NEN ISO/IEC 29167-11 : 2014 | Identical |
| CSA ISO/IEC 29167-11:20 | Identical |
| 18/30357579 DC : 0 | BS ISO/IEC 19823-19 - INFORMATION TECHNOLOGY - CONFORMANCE TEST METHODS FOR SECURITY SERVICE CRYPTO SUITES - PART 19: CRYPTO SUITE RAMON |
| ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
| ISO/IEC 29192-2:2012 | Information technology — Security techniques — Lightweight cryptography — Part 2: Block ciphers |
| ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
| ISO/IEC 29167-1:2014 | Information technology — Automatic identification and data capture techniques — Part 1: Security services for RFID air interfaces |
| ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
| ISO/IEC 18000-63:2015 | Information technology — Radio frequency identification for item management — Part 63: Parameters for air interface communications at 860 MHz to 960 MHz Type C |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.