PRICES include / exclude VAT
Homepage>BS Standards>35 INFORMATION TECHNOLOGY. OFFICE MACHINES>35.040 Character sets and information coding>35.040.50 Automatic identification and data capture techniques>BS ISO/IEC 29167-22:2018 Information technology. Automatic identification and data capture techniques Crypto suite SPECK security services for air interface communications
Sponsored link
immediate downloadReleased: 2018-11-09
BS ISO/IEC 29167-22:2018 Information technology. Automatic identification and data capture techniques Crypto suite SPECK security services for air interface communications

BS ISO/IEC 29167-22:2018

Information technology. Automatic identification and data capture techniques Crypto suite SPECK security services for air interface communications

Format
Availability
Price and currency
English Secure PDF
Immediate download
348.00 EUR
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
34.80 EUR
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
104.40 EUR
English Hardcopy
In stock
348.00 EUR
Standard number:BS ISO/IEC 29167-22:2018
Pages:54
Released:2018-11-09
ISBN:978 0 580 93054 6
Status:Standard
DESCRIPTION

BS ISO/IEC 29167-22:2018


This standard BS ISO/IEC 29167-22:2018 Information technology. Automatic identification and data capture techniques is classified in these ICS categories:
  • 35.040.50 Automatic identification and data capture techniques

This document defines the crypto suite for SPECK for the ISO/IEC 18000 air interfaces standards for radio frequency identification (RFID) devices. Its purpose is to provide a common crypto suite for security for RFID devices that can be referred to by ISO committees for air interface standards and application standards. The crypto suite is defined in alignment with existing air interfaces.

SPECK is a symmetric block cipher that is parameterized in both its block length and key length. In this document, a variety of block/key length options are supported.

This document defines various methods of use for the cipher.

A Tag and an Interrogator can support one, a subset, or all of the specified options, clearly stating what is supported.