ISO/IEC 29167-11:2014 PDF

ISO/IEC 29167-11:2014 PDF

Name:
ISO/IEC 29167-11:2014 PDF

Published Date:
08/01/2014

Status:
Active

Description:

Information technology - Automatic identification and data capture techniques - Part 11: Crypto suite PRESENT-80 security services for air interface communications

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$33.3
Need Help?

ISO/IEC 29167-11:2014 defines the crypto suite for PRESENT-80 for the ISO/IEC 18000 air interface standards for radio frequency identification (RFID) devices. The crypto suite is defined in alignment with existing air interfaces. Its purpose is to provide a common crypto suite for security for RFID devices that may be referred by ISO committees for air interface standards and application standards.

PRESENT-80 is a symmetric block cipher that can process data blocks of 64 bits, using a key length of 80 bits. ISO/IEC 29167-11:2014 defines various authentication methods and methods of use for the cipher. A Tag and an Interrogator may support one, a subset, or all of the specified options, clearly stating what is supported.


File Size : 1 file , 610 KB
Note : This product is unavailable in Russia, Ukraine, Belarus
Published : 08/01/2014

History

ISO/IEC 29167-11:2023
Published Date: 02/01/2023
Information technology - Automatic identification and data capture techniques - Part 11: Crypto suite PRESENT-80 security services for air interface communications
$58.2
ISO/IEC 29167-11:2014
Published Date: 08/01/2014
Information technology - Automatic identification and data capture techniques - Part 11: Crypto suite PRESENT-80 security services for air interface communications
$33.3

Related products

ISO/IEC 16500-2:1999
Published Date: 12/01/1999
Information technology -- Generic digital audio-visual systems -- Part 2: System dynamics, scenarios and protocol requirements
$83.4
ISO/IEC 15444-6:2013
Published Date: 07/15/2013
Information technology - JPEG 2000 image coding system - Part 6: Compound image file format
$83.4
ISO/IEC 23005-4:2018
Published Date: 09/01/2018
Information technology - Media context and control - Part 4: Virtual world object characteristics
$83.4
ISO/IEC 27001:2022
Published Date: 09/30/2022
Information security, cybersecurity and privacy protection - Information security management systems - Requirements
$49.8

Best-Selling Products

SN-ISO/IEC TR 19788-11:2017
Published Date: 11/01/2017
Information technology — Learning, education and training — Metadata for learning resources — Part 11: Migration from LOM to MLR
SN-ISO/IEC TR 20000-10:2013
Published Date: 05/27/2014
Information technology — Service management — Part 10: Concepts and terminology
SN-ISO/IEC TR 20000-10:2015
Published Date: 02/01/2016
Information technology — Service management — Part 10: Concepts and terminology
SN-ISO/IEC TR 20000-4:2010
Published Date: 05/27/2014
Information technology — Service management — Part 4: Process reference model
SN-ISO/IEC TR 20000-5:2013
Published Date: 05/27/2014
Information technology - Service management - Part 5: Exemplar implementation plan for ISO/IEC 20000-1
SN-ISO/IEC TR 20000-9:2015
Published Date: 03/01/2015
Information technology — Service management — Part 9: Guidance on the application of ISO/IEC 20000-1 to cloud services