PD ISO/IEC TS 29167-15:2017
Current
The latest, up-to-date edition.
Information technology. Automatic identification and data capture techniques Crypto suite XOR security services for air interface communications
Hardcopy , PDF
English
31-10-2017
Foreword
Introduction
1 Scope
2 Normative references
3 Terms, definitions, symbols and abbreviated terms
4 Conformance
5 Cipher introduction
6 Parameter definitions
7 State diagram
8 Initialization and resetting
9 Authentication
10 Secure communication (optional)
11 Key update (optional)
Annex A (normative) - State transition tables
Annex B (normative) - Error codes and error handling
Annex C (informative) - Cipher Description
Annex D (informative) - Test vectors
Annex E (normative) - Protocol specific
Annex F (normative) - Authentication procedure pseudo-code
Annex G (informative) - Security considerations
Bibliography
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.