ISO ISO/IEC 29167-11 Information technology - Automatic identification and data capture techniques - Part 11: Crypto suite PRESENT-80 security services for air interface communications - First Edition
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- 35
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- 35.240
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- Картотека зарубежных и международных стандартов
International Organization for Standardization
Information technology - Automatic identification and data capture techniques - Part 11: Crypto suite PRESENT-80 security services for air interface communications - First Edition
N ISO/IEC 29167-11
Annotation
This part of ISO/IEC 29167 defines the crypto suite for PRESENT-80 for the ISO/IEC 18000 air interfaces standards for radio frequency identification (RFID) devices. Its purpose is to provide a common crypto suite for security for RFID devices that can be referred by ISO committees for air interface standards and application standards. PRESENT-80 is a symmetric block cipher that can process data blocks of 64 bits, using a key length of 80 bits.
This part of ISO/IEC 29167 specifies a crypto suite for PRESENT-80 for air interface for RFID systems. The crypto suite is defined in alignment with existing air interfaces.
This part of ISO/IEC 29167 defines various authentication methods and methods of use for the cipher. A Tag and an Interrogator can support one, a subset, or all of the specified options, clearly stating what is supported.
Автоматический перевод:
Информационные технологии - Автоматическая идентификация и методы сбора данных - Часть 11: комплект Crypto ПРЕДСТАВЛЯЕТ 80 служб безопасности для коммуникаций радиоинтерфейса - Первый Выпуск
Эта часть ISO/IEC 29167 определяет crypto комплект для СУЩЕСТВУЮЩИХ 80 для стандартов радиоинтерфейсов ISO/IEC 18000 для радиочастотной идентификации (RFID) устройства. Его цель состоит в том, чтобы обеспечить общий crypto комплект для безопасности для устройств RFID, которые могут быть отнесены комитетами ISO по стандартам радиоинтерфейса и стандартам приложения. СУЩЕСТВУЮЩИЕ 80 являются симметричным блочным шифром, который может обработать блоки данных 64 битов, с помощью длины ключа 80 битов.



