PRICES include / exclude VAT
Homepage>BS Standards>35 INFORMATION TECHNOLOGY. OFFICE MACHINES>35.040 Character sets and information coding>35.040.50 Automatic identification and data capture techniques>BS ISO/IEC 29167-10:2017 Information technology. Automatic identification and data capture techniques Crypto suite AES-128 security services for air interface communications
Sponsored link
immediate downloadReleased: 2017-10-26
BS ISO/IEC 29167-10:2017 Information technology. Automatic identification and data capture techniques Crypto suite AES-128 security services for air interface communications

BS ISO/IEC 29167-10:2017

Information technology. Automatic identification and data capture techniques Crypto suite AES-128 security services for air interface communications

Format
Availability
Price and currency
English Secure PDF
Immediate download
377.00 USD
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
37.70 USD
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
113.10 USD
English Hardcopy
In stock
377.00 USD
Standard number:BS ISO/IEC 29167-10:2017
Pages:68
Released:2017-10-26
ISBN:978 0 580 92094 3
Status:Standard
DESCRIPTION

BS ISO/IEC 29167-10:2017


This standard BS ISO/IEC 29167-10:2017 Information technology. Automatic identification and data capture techniques is classified in these ICS categories:
  • 35.040.50 Automatic identification and data capture techniques

This document specifies the crypto suite for AES-128 for the ISO/IEC 18000 air interfaces standards for radio frequency identification (RFID) devices. Its purpose is to provide a common crypto suite for security for RFID devices that might be referred by ISO committees for air interface standards and application standards.

This document specifies a crypto suite for AES-128 for an air interface for RFID systems. The crypto suite is defined in alignment with existing air interfaces.

This document specifies various authentication methods and methods of use for the encryption algorithm. A Tag and an Interrogator can support one, a subset, or all of the specified options, clearly stating what is supported.