Information technology -- Conformance test methods for security service crypto suites

This document describes test methods for determining the conformance of security crypto suites defined in ISO/IEC 29167-16. This document contains conformance tests for all mandatory and applicable optional functions. The conformance parameters are the following: — parameters that apply directly affecting system functionality and inter-operability; — protocol including commands and replies; — nominal values and tolerances. Unless otherwise specified, the tests in this document are to be applied exclusively to RFID tags and interrogators defined in the ISO/IEC 18000 series using ISO/IEC 29167-16.

Technologies de l'information -- Méthodes d'essai de conformité pour les suites cryptographiques des services de sécurité

General Information

Status
Published
Publication Date
25-Oct-2020
Current Stage
5060 - Close of voting Proof returned by Secretariat
Start Date
10-Sep-2020
Completion Date
10-Sep-2020
Ref Project

Buy Standard

Standard
ISO/IEC 19823-16:2020 - Information technology -- Conformance test methods for security service crypto suites
English language
21 pages
sale 15% off
Preview
sale 15% off
Preview
Draft
ISO/IEC PRF 19823-16:Version 24-apr-2020 - Information technology -- Conformance test methods for security service crypto suites
English language
21 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (sample)

INTERNATIONAL ISO/IEC
STANDARD 19823-16
First edition
2020-10
Information technology —
Conformance test methods for
security service crypto suites —
Part 16:
Crypto suite ECDSA-ECDH
security services for air interface
communications
Reference number
ISO/IEC 19823-16:2020(E)
ISO/IEC 2020
---------------------- Page: 1 ----------------------
ISO/IEC 19823-16:2020(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2020

All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may

be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting

on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address

below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO/IEC 2020 – All rights reserved
---------------------- Page: 2 ----------------------
ISO/IEC 19823-16:2020(E)
Contents Page

Foreword ........................................................................................................................................................................................................................................iv

Introduction ..................................................................................................................................................................................................................................v

1 Scope ................................................................................................................................................................................................................................. 1

2 Normative references ...................................................................................................................................................................................... 1

3 Terms, definitions, symbols and abbreviated terms ....................................................................................................... 1

3.1 Terms and definitions ....................................................................................................................................................................... 1

3.2 Symbols ......................................................................................................................................................................................................... 2

3.3 Abbreviated terms ............................................................................................................................................................................... 2

4 Test methods ............................................................................................................................................................................................................. 2

4.1 General ........................................................................................................................................................................................................... 2

4.2 By demonstration ................................................................................................................................................................................. 2

4.3 By design ...................................................................................................................................................................................................... 3

5 Test methods in respect to ISO/IEC 18000-4 Mode 4 ..................................................................................................... 3

5.1 Default items applicable to the test methods ............................................................................................................... 3

5.1.1 Test environment ............................................................................................................................................................ 3

5.1.2 Pre-conditioning .............................................................................................................................................................. 3

5.1.3 Default tolerance .............................................................................................................................................................. 3

5.1.4 Total measurement uncertainty ......................................................................................................................... 3

5.2 Test setup and measurement equipment......................................................................................................................... 3

5.2.1 Test setup for interrogator testing ................................................................................................................... 4

5.2.2 Test setup for tag testing ........................................................................................................................................... 4

5.2.3 Test equipment .................................................................................................................................................................. 4

6 Test methods in respect to ISO/IEC 29167-16 interrogators and tags .........................................................5

6.1 Test map for optional features .................................................................................................................................................. 5

6.2 Crypto suite requirements ............................................................................................................................................................ 5

6.2.1 General...................................................................................................................................................................................... 5

6.2.2 Crypto suite requirements of ISO/IEC 29167-16:2015, Clauses 1 - 6 ............................... 5

6.2.3 Crypto suite requirements of ISO/IEC 29167-16:2015, Clauses 7 - 11 ............................ 5

6.2.4 Crypto suite requirements of ISO/IEC 29167-16:2015, Annex A .................. .....................10

6.2.5 Crypto suite requirements of ISO/IEC 29167-16: 2015 in Annex E ................................11

6.3 Test patterns for ISO/IEC 18000-4:2018, Mode 4 .................................................................................................12

6.3.1 Test pattern 1 utilizing ISO/IEC 18000-4:2018, 9.3.3 ..................................................................12

6.3.2 Test pattern 2 utilizing ISO/IEC 18000-4:2018, 9.3.3 ..................................................................14

6.3.3 Test pattern 3 utilizing ISO/IEC 18000-4:2018, 9.3.3 ..................................................................14

6.3.4 Test pattern 4 utilizing ISO/IEC 18000-4:2018, 9.3.3 ..................................................................15

6.3.5 Test pattern 5 utilizing ISO/IEC 18000-4:2018, 9.3.3 ..................................................................15

6.3.6 Test pattern 6 utilizing ISO/IEC 18000-4:2018, 9.3.3 ..................................................................15

6.3.7 Test pattern 7 utilizing ISO/IEC 18000-4:2018, 9.3.3 ..................................................................15

6.3.8 Test pattern 8 utilizing ISO/IEC 18000-4:2018, 9.3.3 ..................................................................15

6.3.9 Test pattern 9 utilizing ISO/IEC 18000-4:2018, 9.3.3 ..................................................................16

6.3.10 Test pattern 10 utilizing ISO/IEC 18000-4:2018, 9.3.3 ...............................................................16

Annex A (informative) Test parameters example ................................................................................................................................17

Bibliography .............................................................................................................................................................................................................................21

© ISO/IEC 2020 – All rights reserved iii
---------------------- Page: 3 ----------------------
ISO/IEC 19823-16:2020(E)
Foreword

ISO (the International Organization for Standardization) is a worldwide federation of national standards

bodies (ISO member bodies). The work of preparing International Standards is normally carried out

through ISO technical committees. Each member body interested in a subject for which a technical

committee has been established has the right to be represented on that committee. International

organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.

ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of

electrotechnical standardization.

The procedures used to develop this document and those intended for its further maintenance are

described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the

different types of ISO documents should be noted. This document was drafted in accordance with the

editorial rules of the ISO/IEC Directives, Part 2 (see www .iso .org/ directives).

Attention is drawn to the possibility that some of the elements of this document may be the subject of

patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of

any patent rights identified during the development of the document will be in the Introduction and/or

on the ISO list of patent declarations received (see www .iso .org/ patents).

Any trade name used in this document is information given for the convenience of users and does not

constitute an endorsement.

For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and

expressions related to conformity assessment, as well as information about ISO's adherence to the

World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see www .iso .org/

iso/ foreword .html.

This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,

Subcommittee SC 31, Automatic identification and data capture techniques.
A list of all parts in the ISO/IEC 19823 series can be found on the ISO website.

Any feedback or questions on this document should be directed to the user’s national standards body. A

complete listing of these bodies can be found at www .iso .org/ members .html.
iv © ISO/IEC 2020 – All rights reserved
---------------------- Page: 4 ----------------------
ISO/IEC 19823-16:2020(E)
Introduction

The ISO/IEC 29167 series describes security services as applicable for the ISO/IEC 18000 series. The

various parts of ISO/IEC 29167 describe crypto suites that are optional extensions to the ISO/IEC 18000

series air interfaces.

The ISO/IEC 19823 series describes the conformance test methods for security service crypto suites. It is

related to the ISO/IEC 18047 series, which describes the radio frequency identification device conformance

test methods, in the same way as the ISO/IEC 29167 series is related to the ISO/IEC 18000 series.

These relations mean that for a product that is claimed to conform to a pair of ISO/IEC 18000 and

ISO/IEC 29167 documents, then the test methods of the ISO/IEC 18047 and ISO/IEC 19823 documents

apply. If a product supports more than one part of ISO/IEC 18000 or ISO/IEC 29167, all related parts of

ISO/IEC 18047 and ISO/IEC 19823 apply.

This part of ISO/IEC 19823 describes the test methods for the ECDSA-ECDH crypto suite as standardized

in ISO/IEC 29167-16.

The International Organization for Standardization (ISO) and International Electrotechnical

Commission (IEC) draws attention to the fact that it is claimed that compliance with this document

may involve the use of a patent concerning radio-frequency identification security technology given in

Clause 6.

ISO and IEC take no position concerning the evidence, validity and scope of this patent right.

The holder of this patent right has assured the ISO and IEC that they are willing to negotiate licences

under reasonable and non-discriminatory terms and conditions with applicants throughout the world.

In this respect, the statement of the holder of this patent right is registered with ISO and IEC.

Information may be obtained from:
Patent holder: China IWNCOMM Co., Ltd.

Address: A201, QinFeng Ge, Xi'an Software Park, No.68 KeJi 2nd Road, Xi'an Hi-tech Industrial

Development Zone, Xi'an, Shaanxi, P.R.China 710075

Attention is drawn to the possibility that some of the elements of this document may be the subject of

patent rights other than those identified above. ISO and IEC shall not be held responsible for identifying

any or all such patent rights.

NOTE Test methods for interrogator and tag performance are covered by the ISO/IEC 18046 series.

© ISO/IEC 2020 – All rights reserved v
---------------------- Page: 5 ----------------------
INTERNATIONAL STANDARD ISO/IEC 19823-16:2020(E)
Information technology — Conformance test methods for
security service crypto suites —
Part 16:
Crypto suite ECDSA-ECDH security services for air interface
communications
1 Scope

This document describes test methods for determining the conformance of security crypto suites

defined in ISO/IEC 29167-16.

This document contains conformance tests for all mandatory and applicable optional functions.

The conformance parameters are the following:

— parameters that apply directly affecting system functionality and inter-operability;

— protocol including commands and replies;
— nominal values and tolerances.

Unless otherwise specified, the tests in this document are to be applied exclusively to RFID tags and

interrogators defined in the ISO/IEC 18000 series using ISO/IEC 29167-16.
2 Normative references

The following documents are referred to in the text in such a way that some or all of their content

constitutes requirements of this document. For dated references, only the edition cited applies. For

undated references, the latest edition of the referenced document (including any amendments) applies..

ISO/IEC 19762 (all parts), Information technology — Automatic identification and data capture (AIDC)

techniques — Harmonized vocabulary

ISO/IEC 18000-4:2018, Information technology — Radio frequency identification for item management —

Part 4: Parameters for air interface communications at 2.45 GHz

ISO/IEC 29167-16:2015, Information technology — Automatic identification and data capture

techniques — Part 16: Crypto suite ECDSA-ECDH security services for air interface communications

3 Terms, definitions, symbols and abbreviated terms
3.1 Terms and definitions

For the purposes of this document, the terms and definitions given in ISO/IEC 19762 and

ISO/IEC 29167-16 and the following apply.

ISO and IEC maintain terminological databases for use in standardization at the following addresses:

— ISO Online browsing platform: available at https:// www .iso .org/ obp
— IEC Electropedia: available at http:// www .electropedia .org/
© ISO/IEC 2020 – All rights reserved 1
---------------------- Page: 6 ----------------------
ISO/IEC 19823-16:2020(E)
3.2 Symbols
For the purposes of this document, the symbols given in ISO/IEC 19762 apply.
3.3 Abbreviated terms

For the purposes of this document, the abbreviated terms given in ISO/IEC 19762 and the following apply.

ECDH elliptic curve diffie-hellman
ECDHP ECDH parameter
ECDSA ellipticcurvedigital signature algorithm
MAC message authentication code
MAM mutual authentication message
MIC message integrity code
RN random number
SEK session encryption key
SIK session integrity check key
TPK temporary public key
TRAIS tag and reader air interface security
TRAIS-P tag and reader air interface security based on public key cryptography
TTP trusted third party
TTPID identifier of TTP
4 Test methods
4.1 General

This document describes the general test methods for ISO/IEC 29167-16. As the parts of ISO/IEC 19823

are always tested in relation with the ISO/IEC 18047 series, a duplication of information requirements

and specifications should be avoided.

Clause 5 defines elements that are assumed to be covered in the respective part of the ISO/IEC 19823

series.

Clause 6 defines elements that are not covered by the ISO/IEC 18047 series and are therefore addressed

in this document.
4.2 By demonstration

"By demonstration" means laboratory testing of one or, if required for statistical reasons, multiple

products, processes, or services to ensure conformance.

A test laboratory meeting the requirements of ISO/IEC 17025 shall be selected for the performance of

the indicated testing to ensure conformance of the component or system.

For protocol requirements that are verified by demonstration, the test conditions are specified by this

document. The detailed test plan is at the discretion of the test laboratory.
2 © ISO/IEC 2020 – All rights reserved
---------------------- Page: 7 ----------------------
ISO/IEC 19823-16:2020(E)
4.3 By design

"By design" means design parameters and/or theoretical analyses that ensure conformance. A vendor

submitting a component or system for compliance testing shall provide the necessary technical

information, in the form of a technical memorandum or similar. A test laboratory shall issue a test

certificate indicating whether the technical analysis was sufficient to ensure conformance of the

component or system.

For protocol requirements that are verified by design, the method of technical analysis is at the

discretion of the submitting vendor and is not specified by this document. In general, the technical

analysis shall have sufficient rigor and technical depth to convince a test engineer knowledgeable of the

protocol that the particular requirement has been met.
5 Test methods in respect to ISO/IEC 18000-4 Mode 4
5.1 Default items applicable to the test methods

The following requirements and applicable optional requirements shall be fulfilled.

5.1.1 Test environment

Unless otherwise specified, testing shall take place in an environment of temperature 23 °C ± 3 °C

(73 °F ± 5 °F) and relative humidity of 40 % to 60 %.
5.1.2 Pre-conditioning

Where pre-conditioning is required by the test method, the tags and interrogators to be tested shall be

conditioned to the test environment for an appropriate period of time before testing.

5.1.3 Default tolerance

Unless otherwise specified, a default tolerance of ±5 % shall be applied to the quantity values given

to specify the characteristics of the test equipment (e.g. linear dimensions) and the test method

procedures (e.g. test equipment adjustments).
5.1.4 Total measurement uncertainty

The total measurement uncertainty for each quantity determined by these test methods shall be stated

in the test report.

NOTE1 Basic information is given in “ISO Guide to the Expression of Uncertainty in Measurement”, ISBN 92-

67-10188-9, 1993.

NOTE2 The default items applicable to the test methods defined in 5.1 is given in ISO/IEC TR 18047-4.

5.2 Test setup and measurement equipment

This subclause defines the test setup and measurement equipment for verifying the operation of a tag

or an interrogator according to ISO/IEC 18000-4 Mode 4.
Test results shall not be influenced by the setup method of the test.
Test setups include:
— test setup for interrogator testing (see 5.2.1),
— test setup for tag testing (see 5.2.2),
— test equipment (see 5.2.3).
© ISO/IEC 2020 – All rights reserved 3
---------------------- Page: 8 ----------------------
ISO/IEC 19823-16:2020(E)
These are described in the following subclauses.
5.2.1 Test setup for interrogator testing

An interrogator with integral antenna(e) shall be equipped with temporary antenna connector(s), or

else coupling device(s) [i.e. sense antenna(e)] shall be used to connect to the test equipment.

A sense antenna shall not affect test results. Appropriate distances (e.g. 30 cm), antenna sizes and types

(e.g. patch antenna) and antenna polarization (i.e. circular polarization) shall be used. The antenna

configuration and distance shall be included in the test report.

To set up an interrogator with the appropriate test pattern and operational modes, one of two methods

shall be used (combinations shall also be possible):
a) an implemented test mode,
b) a tag for initializing the appropriate operational mode.

The air interface parameter in a test mode shall behave in the same way as the air interface parameter

during normal usage.

Unless otherwise stated, for all tests, the frequency of the reference carrier shall conform to

ISO/IEC 18000-4:2018, 9.3.1. The output power shall be set to maximum (both carriers switched on).

5.2.2 Test setup for tag testing

A tag with integral antenna(e) shall be equipped with temporary antenna connector(s),or else suitable

coupling device(s) [i.e. antenna(e)] shall be used to connect to the test equipment.

A sense antenna shall not affect test results. Appropriate distances (e.g. 30 cm), antenna sizes and

types (e.g. patch antenna), as well as antenna polarization (i.e. circular polarization) shall be used. The

antenna configuration and distance shall be included in the test report.

To set up a tag with the appropriate test pattern and operational modes, one of two methods shall be

used (combinations shall also be possible):
a) an implemented test mode,
b) an interrogator for initializing the appropriate operational mode.

Unless otherwise stated, for all tests, the frequency of the reference carrier shall conform to

ISO/IEC 18000-4:2018, 9.3.1.
5.2.3 Test equipment

All tests shall be performed using commercial test equipment. In addition to the measurement devices

described in the following subclauses, appropriate devices such as power supplies, splitters, combiners

and cables shall be used.

The reference point for all measurements shall be either (temporary) antenna connector(s), or

appropriate coupling device(s). The reference point shall be documented in the test report.

5.2.3.1 Spectrum analyser

A spectrum analyser with the capability of digital demodulating and with vector signal analysis

capability shall be used. Appropriate trigger functionality shall be either implemented in the spectrum

analyser or generated externally with additional measurement devices.
4 © ISO/IEC 2020 – All rights reserved
---------------------- Page: 9 ----------------------
ISO/IEC 19823-16:2020(E)
5.2.3.2 Signal generator

A signal generator for the 2,45 GHz band shall be used to generate an interrogator output signal for

testing tags. The signal level for the tests shall be within the operational range of the receiver input of the

tag. The input level shall be specified by the tag manufacturer and shall be documented in the test report.

5.2.3.3 Logic analyser

A logic analyser shall be used for verification of the correct data. Therefore, the analyser shall be

capable of storage of sequent samples in 0,5 second.
6 Test methods in respect to ISO/IEC 29167-16 interrogators and tags
6.1 Test map for optional features

Table 1 lists all optional features of the crypto suite defined by Tag and Reader Air Interface Security

(TRAIS) based on Public key cryptography (TRAIS-P) and shall be used as a template for reporting the

test results. Furthermore, Table 1 shall be used in reference to the test requirements in 6.2.

Table 1 — Test map for optional features
Mark items to be tested
# Feature Additional requirement Test results
for supplied product
1 Mutual Authen- Shall be tested with the Authenticate
tication without command of the relevant part of
TTP involved ISO/IEC 18000.
2 Mutual Authen- Shall be tested with the Authenticate
tication with command of the relevant part of
TTP involved ISO/IEC 18000.
3 Authenticate Shall be tested with the AuthComm com-
communication mand of the relevant part of
ISO/IEC 18000.
4 Secure Shall be tested with the SecureComm
communication command of the relevant part of
ISO/IEC 18000.

Table 2 to Table 5 lists all crypto suite requirements that shall be tested in depending on the features of

Table 1 as supported by the device under test. Items marked with M are mandatory and shall be tested

for each device under test.
6.2 Crypto suite requirements
6.2.1 General
This subclause contains all of the requirements of ISO/IEC 29167-16.
6.2.2 Crypto suite requirements of ISO/IEC 29167-16:2015, Clauses 1 - 6

All of the requirements of ISO/IEC 29167-16:2015, Clauses 1-6 are mandatory, inherently by design only.

6.2.3 Crypto suite requirements of ISO/IEC 29167-16:2015, Clauses 7 - 11

Table 2 contains all of the requirements of ISO/IEC 29167-16:2015, Clauses 7 – 11.

The column MO (Mandatory / Optional) contains the following information:
— items marked with "M" are mandatory and shall be tested for all devices;
© ISO/IEC 2020 – All rights reserved 5
---------------------- Page: 10 ----------------------
ISO/IEC 19823-16:2020(E)

— items marked with "O" are optional and shall be tested only for devices that support the feature that

is indicated by the requirement.
Table 2 — Crypto suite requirements
Protocol
Item Requirement M/O Applies To How Verified
Subclause
1 7.1 ECDHP: M Interrogator/ By design
Tag
ECDH parameter, consisting of parame-
ter ID, parameter length and parameter
content three parts, where the parame-
ter ID shall be 8 bits; parameter shall be
16 bits in length and indicates the num-
ber of bytes in the parameter content.
The values of ECDH parameter:
1) 01 : The field value shall be denoted
by OIDs. The Length subfield
indicates the number of octets of
OIDs. The values of Content subfield
are the content of OIDs.
2) Other: All other values are RFU.
2 7.1 MK[127:0] M Interrogator/ By design
Tag
Master key
3 7.1 MIC [255:0] M Tag By design
Message integrity code generated by the
tag, the length shall be 256 bits.
4 7.1 RN [63:0] M Tag By design
64-bit random number generated by the
tag
5 7.1 Sig [383:0] M Tag By design
Digital signature generated by the tag.
The length shall be 384 bits.
6 7.1 TPK [391:0] M Tag By design
Temporary public key generated by tag,
the length shall be 392 bits.
7 7.1 X [391:0] M Tag By design
Temporary private key generated by tag
and used for ECDH exchange.
8 7.1 MIC [255:0] M Interrogator By design
Message integrity code generated by the
interrogator, the length shall be 256 bits.
9 7.1 RN [63:0] M Interrogator By design
64-bit random number generated by
theinterrogator.
10 7.1 Sig [383:0] M Interrogator By design
Digital signature generated by the inter-
rogator. The length shall be 384 bits.
11 7.1 TPK [391:0] M Interrogator By design
Temporary public key generated by in-
terrogator, the length shall be 392 bits.
6 © ISO/IEC 2020 – All rights reserved
---------------------- Page: 11 ----------------------
ISO/IEC 19823-16:2020(E)
Table 2 (continued)
Protocol
Item Requirement M/O Applies To How Verified
Subclause
12 7.1 X [391:0] M Interrogator By design
Temporary private key generated by in-
terrogator and used for ECDH exchange.
13 7.2 Cert Type shall be 4 bits, Value shall be: M Interrogator/ By design
Tag
a) 0000:Value subfield contains X.509
certificate of Interrogator, Cert ;
b) 0001:Value subfield contains X.509
certificate of Tag, Cert ;
c) 0010:Value subfield contains X.509
certificate of TTP, Cert ;
ttp
d) Other: All other values are RFU.
14 8 A transition to Ready state shall also M Tag By design
cause a reset of all variables used by the
crypto suite.
15 9 Implementations of this crypto suite M Tag By design
shall ensure that all memory used for
intermediate results is cleared after
each operation (message-response pair)
and after reset.
16 10.2.1 The crypto suite shall parse the Mes- M Interrogator By demonstration
sages and process the data based on the using Test patterns
value of CSI, which is the first parame- 3,4,7 and 8
ter of all commands.
17 10.2.2 The FN shall be 8 bits. M Interrogator By demonstration
using Test patterns
3,4,7 and 8
18 10.2.2 The IID shall be 64 bits. M Interrogator By demonstration
using Test patterns
3,4,7 and 8

19 10.2.2 The following sections of this document M Interrogator By demonstration

describe the formatting of Message and using Test patterns
Response for authentication. AuthType 3,4,7 and 8
shall be "00".
20 10.2.2 In MAM1.1 Message, AuthStep shall be M Interrogator By demonstration
"000". using Test patterns
3,4,7 and 8

21 10.2.2 If TTP not to be involved, TTPID shall be M Interrogator By demonstration

"0000 0000", or using Test patterns
3,4,7 and 8
If TTP to be involved, TTPID shall be
"0000 0001".
22 10.2.2 ECDH parameter shall be 01 . M Interrogator By demonstration
using Test patterns
3,4,7 and 8
23 10.2.3 The FN shall be 8 bits. M Tag By demonstration
using Test patterns
1,2,5 and 6
24 10.2.3 TheTID shall be 64 bits. M Tag By demonstration
using Test patterns
1,2,5 and 6
© ISO/IEC 2020 – All rights reserved 7
---------------------- Page: 12 ----------------------
ISO/IEC 19823-16:2020(E)
Table 2 (continued)
Protocol
Item Requirement M/O Applies To How Verified
Subclause
25 10.2.3 TTPID is the same as the one in the M Tag By demonstration
MAM1.1 Message. using Test patterns
1,2,5 and 6
26 10.2.3 ECDH parameter shall be 01 . M Tag By demonstration
using Test patterns
1,2,5 and 6
27 10.2.4 The FN shall be 8 bits. M Interrogator By demonstration
using Test patterns
4 and 8
28 10.2.4 The following sections of this document M Interrogator By demonstrat
...

DRAFT INTERNATIONAL STANDARD
ISO/IEC DIS 19823-16
ISO/IEC JTC 1/SC 31 Secretariat: ANSI
Voting begins on: Voting terminates on:
2019-11-27 2020-02-19
Information technology — Conformance test methods for
security service crypto suites —
Part 16:
Crypto suite ECDSA-ECDH security services for air interface
communications
ICS: 35.030
THIS DOCUMENT IS A DRAFT CIRCULATED
FOR COMMENT AND APPROVAL. IT IS
THEREFORE SUBJECT TO CHANGE AND MAY
NOT BE REFERRED TO AS AN INTERNATIONAL
STANDARD UNTIL PUBLISHED AS SUCH.
IN ADDITION TO THEIR EVALUATION AS
BEING ACCEPTABLE FOR INDUSTRIAL,
This document is circulated as received from the committee secretariat.
TECHNOLOGICAL, COMMERCIAL AND
USER PURPOSES, DRAFT INTERNATIONAL
STANDARDS MAY ON OCCASION HAVE TO
BE CONSIDERED IN THE LIGHT OF THEIR
POTENTIAL TO BECOME STANDARDS TO
WHICH REFERENCE MAY BE MADE IN
Reference number
NATIONAL REGULATIONS.
ISO/IEC DIS 19823-16:2019(E)
RECIPIENTS OF THIS DRAFT ARE INVITED
TO SUBMIT, WITH THEIR COMMENTS,
NOTIFICATION OF ANY RELEVANT PATENT
RIGHTS OF WHICH THEY ARE AWARE AND TO
PROVIDE SUPPORTING DOCUMENTATION. ISO/IEC 2019
---------------------- Page: 1 ----------------------
ISO/IEC DIS 19823-16:2019(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2019

All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may

be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting

on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address

below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Fax: +41 22 749 09 47
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO/IEC 2019 – All rights reserved
---------------------- Page: 2 ----------------------
ISO/IEC DIS 19823-16:2019(E)
Contents

Foreword ............................................................................................................................................................................ 1

Introduction ...................................................................................................................................................................... 2

1 Scope ........................................................................................................................................................................... 3

2 Normative references .............................................................................................................................................. 3

3 Terms, definitions, symbols and abbreviated terms ....................................................................................... 3

4 Test methods ............................................................................................................................................................. 4

4.1 General ............................................................................................................................................................................ 4

4.2 By demonstration ........................................................................................................................................................ 4

4.3 By design ....................................................................................................................................................................... 4

5 Test methods in respect to the ISO/IEC 18000-4 Mode 4 .............................................................................. 5

5.1 Default items applicable to the test methods ...................................................................................................... 5

5.2 Test set-up and measurement equipment ............................................................................................................. 5

5.2.1 Test set-up for interrogator testing ........................................................................................................... 5

5.2.2 Test set-up for tag testing ............................................................................................................................ 5

5.2.3 Test equipment ............................................................................................................................................... 6

6 Test methods in respect to the ISO/IEC 29167-16 interrogators and tags ................................................ 6

6.1 Test map for optional features ................................................................................................................................. 6

6.2 Crypto suite requirements ......................................................................................................................................... 7

6.2.1 Crypto suite requirements of ISO/IEC 29167-16 in clauses 1 - 6 .................................................. 7

6.2.2 Crypto suite requirements of ISO/IEC 29167-16 in clauses 7 - 11 ............................................... 7

6.2.3 Crypto suite requirements of ISO/IEC 29167-16 in Annex A ..................................................... 13

6.2.4 Crypto suite requirements of ISO/IEC 29167-16 in Annex E ...................................................... 13

6.3 Test patterns for ISO/IEC 18000-4 Mode 4 ..................................................................................................... 15

6.3.1 Test pattern 1 utilizing ISO/IEC 18000-4 clause 9.3.3 ....... Error! Bookmark not defined.

6.3.2 Test pattern 2 utilizing ISO/IEC 18000-4 clause 9.3.3 ....... Error! Bookmark not defined.

6.3.3 Test pattern 3 utilizing ISO/IEC 18000-4 clause 9.3.3 ....... Error! Bookmark not defined.

© ISO/IEC 2019 – All rights reserved
---------------------- Page: 3 ----------------------
ISO/IEC DIS 19823-16:2019(E)

6.3.4 Test pattern 4 utilizing ISO/IEC 18000-4 clause 9.3.3 ....... Error! Bookmark not defined.

6.3.5 Test pattern 5 utilizing ISO/IEC 18000-4 clause 9.3.3 ....... Error! Bookmark not defined.

6.3.6 Test pattern 6 utilizing ISO/IEC 18000-4 clause 9.3.3 ....... Error! Bookmark not defined.

6.3.7 Test pattern 7 utilizing ISO/IEC 18000-4 clause 9.3.3 ....... Error! Bookmark not defined.

6.3.8 Test pattern 8 utilizing ISO/IEC 18000-4 clause 9.3.3 ....... Error! Bookmark not defined.

6.3.9 Test pattern 9 utilizing ISO/IEC 18000-4 clause 9.3.3 ................................................................... 18

6.3.10 Test pattern 10 utilizing ISO/IEC 18000-4 clause 9.3.3 ................................................................ 19

Annex A (informative) Test parameters example ......................................................................................... 21

A.1 Authentication Elliptic E curve ......................................................................................................................... 21

A.2 Authentication Parameters ................................................................................................................................ 21

A.3 Authentication Process ........................................................................................................................................ 23

Bibliography ................................................................................................................................................................... 26

© ISO/IEC 2019 – All rights reserved
---------------------- Page: 4 ----------------------
ISO/IEC DIS 19823-16:2019(E)
Foreword

ISO (the International Organization for Standardization) is a worldwide federation of national standards

bodies (ISO member bodies). The work of preparing International Standards is normally carried out through

ISO technical committees. Each member body interested in a subject for which a technical committee has

been established has the right to be represented on that committee. International organizations, governmental

and non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the

International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization.

The procedures used to develop this document and those intended for its further maintenance are described in

the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the different types of

ISO documents should be noted. This document was drafted in accordance with the editorial rules of the

ISO/IEC Directives, Part 2. www.iso.org/directives

Attention is drawn to the possibility that some of the elements of this document may be the subject of patent

rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of any patent

rights identified during the development of the document will be in the Introduction and/or on the ISO list of

patent declarations received. www.iso.org/patents

Any trade name used in this document is information given for the convenience of users and does not

constitute an endorsement.

For an explanation on the meaning of ISO specific terms and expressions related to conformity assessment, as

well as information about ISO's adherence to the WTO principles in the Technical Barriers to Trade (TBT) see

the following URL: Foreword - Supplementary information
The committee responsible for this document is ISO/IEC JTC1.

ISO/IEC 19823 consists of the following parts, under the general title Information technology —

Conformance test methods for security service crypto suites:
— Part 1: General requirements

— Part 10: Crypto suite AES-128 security services for air interface communications

— Part 11: Crypto suite PRESENT-80 security services for air interface communications

— Part 12: Crypto suite ECC-DH security services for air interface communications

— Part 13: Crypto suite Grain-128A security services for air interface communications

— Part 16: Crypto suite ECDSA-ECDH security services for air interface communications

— Part 17: Crypto suite cryptoGPS security services for air interface communications

— Part 19: Crypto suite RAMON security services for air interface communications
© ISO/IEC 2019 – All rights reserved
---------------------- Page: 5 ----------------------
ISO/IEC DIS 19823-16:2019(E)
Introduction

ISO/IEC 29167 describes security services as applicable for ISO/IEC 18000. The various parts of

ISO/IEC 29167 describe crypto suites that are optional extensions to the ISO/IEC 18000 air interfaces.

ISO/IEC 19823 describes the Conformance test methods for security service crypto suites. ISO/IEC 19823 is

related to ISO/IEC 18047, which describes the radio frequency identification device conformance test

methods, in the same way as ISO/IEC 29167 is related to ISO/IEC 18000.

These relations mean that for a product that is claimed to be compliant to a pair of ISO/IEC 18000-n and

ISO/IEC 29167-m then the test methods of ISO/IEC 18047-n and ISO/IEC 19823-m apply. If a product

supports more than one part of ISO/IEC 18000 or ISO/IEC 29167 all related parts of ISO/IEC 18047 and

ISO/IEC 19823 apply.

This part of ISO/IEC 19823 describes the test methods for the ECDSA-ECDH crypto suite as standardized in

ISO/IEC 29167-16:2015.

NOTE Test methods for interrogator and tag performance are covered by the multiple parts of ISO/IEC 18046.

© ISO/IEC 2019 – All rights reserved
---------------------- Page: 6 ----------------------
DRAFT INTERNATIONAL STANDARD ISO/IEC DIS 19823-16:2019(E)
Information technology — Conformance test methods for security
service crypto suites — Part 16: Crypto suite ECDSA-ECDH security
services for air interface communications
1 Scope

This part of ISO/IEC 19823 describes test methods for determining the conformance of security crypto suite

defined in ISO/IEC 29167-16.

This part of ISO/IEC 19823 contains conformance tests for all mandatory and applicable optional functions.

The conformance parameters are the following:

— parameters that apply directly affecting system functionality and inter-operability

— protocol including commands and replies
— nominal values and tolerances

Unless otherwise specified, the tests in this part of ISO/IEC 19823 are to be applied exclusively related to

RFID tags and interrogators defined in the ISO/IEC 18000 series using ISO/IEC 29167-16.

2 Normative references

The following referenced documents are indispensable for the application of this document. For dated

references, only the edition cited applies. For undated references, the latest edition of the referenced document

(including any amendment s) applies.

ISO/IEC 19762 (all parts), Information technology — Automatic identification and data capture (AIDC)

techniques — Harmonized vocabulary

ISO/IEC 18000-4, Information technology -- Radio frequency identification for item management — Part 4:

Parameters for air interface communications at 2.45 GHz

ISO/IEC TR 18047-4, Information technology — Radio frequency identification device conformance test

methods — Part 4: Test methods for air interface communications at 2.45 GHz

ISO/IEC 29167-16, Information technology -- Automatic identification and data capture techniques — Part

16: Crypto suite ECDSA-ECDH security services for air interface communications
3 Terms, definitions, symbols and abbreviated terms
3.1 Terms and definitions

For the purposes of this document, the terms and definitions given in ISO/IEC 19762 and ISO/IEC 29167-16

apply.
3.2 Symbols
For the purposes of this document, the symbols given in ISO/IEC 19762 apply.
© ISO/IEC 2019 – All rights reserved
---------------------- Page: 7 ----------------------
ISO/IEC DIS 19823-16:2019(E)
3.3 Abbreviated terms

For the purposes of this document, the abbreviated terms given in ISO/IEC 19762 and the following apply.

ECDH Elliptic Curve Diffie-Hellman
ECDHP ECDH Parameter
ECDSA Elliptic Curve Digital Signature Algorithm
MAC Message Authentication Code
MAM Mutual Authentication Message
MIC Message Integrity Code
RN Random Number
SEK Session Encryption Key
SIK Session Integrity check Key
TPK Temporary Public Key
TRAIS Tag and Reader Air Interface Security
TRAIS-P Tag and Reader Air Interface Security based on Public key cryptography
TTP Trusted Third Party
TTPID IDentifier of TTP
4 Test methods
4.1 General

This document describes test methods for ISO/IEC 29167-16. As the parts of ISO/IEC 19823 are always

tested in relation with ISO/IEC 18047, a duplication of information requirements and specifications is meant

to be avoided.

Clause 5 defines elements that are covered in the respective part of ISO/IEC 19823.

Clause 6 defines elements that are not covered by ISO/IEC 18047 and are therefore addressed in this

document.
4.2 By demonstration

Laboratory testing of one, or (if required for statistical reasons), multiple products, processes, or services to

ensure compliance. A test laboratory that meets ISO/IEC 17025 shall perform the indicated testing to ensure

conformance of the component or system.

For Protocol requirements that are verified by demonstration, the test conditions are specified by this

document. The detailed test plan is at the discretion of the test laboratory.
4.3 By design

Design parameters and/or theoretical analysis that ensure compliance. A vendor submitting a component or

system for compliance testing shall provide the necessary technical information, in the form of a technical

memorandum or similar. A certified test laboratory shall certify the technical analysis as being sufficient to

ensure conformance of the component or system.

For Protocol requirements that are verified by design, the method of technical analysis is at the discretion of

the submitting vendor and is not specified by this document. In general, the technical analysis shall have

© ISO/IEC 2019 – All rights reserved
---------------------- Page: 8 ----------------------
ISO/IEC DIS 19823-16:2019(E)

sufficient rigor and technical depth to convince a test engineer knowledgeable of the Protocol that the

particular requirement has been met.
5 Test methods in respect to the ISO/IEC 18000-4 Mode 4
5.1 Default items applicable to the test methods

The following requirements and applicable optional requirements of ISO/IEC TR 18047-4 shall be fulfilled:

 Sub-clause: 5.1 Default conditions applicable to the test methods
5.2 Test set-up and measurement equipment

This subclause defines the test set-up and measurement equipment for verifying the operation of a tag or an

interrogator according to ISO/IEC 18000-4 Mode 4.
Test results shall not be influenced by the set-up method of the test.
Test set-ups include:
— test set-up for interrogator testing (see 5.2.1),
— test set-up for tag testing (see 5.2.2),
— test equipment (see 5.2.3).
These are described in the following subclauses.
5.2.1 Test set-up for interrogator testing

An interrogator with integral antenna(s) shall be equipped with temporary antenna connector(s) or coupling

device(s) [i.e. sense antenna(s)] shall be used to connect to the test equipment.

A sense antenna shall not affect test results; appropriate distances (e.g. 30 cm), antenna sizes and types (e.g.

patch antenna), as well as antenna polarization (i.e. circular polarization) shall be used. The antenna

configuration and distance shall be included in the test report.

To set up an interrogator with the appropriate test pattern and operational modes one of two methods shall be

used (combinations shall also be possible):
— an implemented test mode,
— a tag for initializing the appropriate operational mode.

The air interface parameter in a test mode shall behave the same as the air interface parameter during normal

usage.
Unless otherwise stated the following frequencies shall be used for all tests.

The frequency of the reference carrier shall be conformance with Sub-clause 9.3.1 in ISO/IEC 18000-4. The

output power shall be set to maximum (both carriers switched on).
5.2.2 Test set-up for tag testing

A tag with integral antenna(s) shall be equipped with temporary antenna connector(s), or suitable coupling

device(s) [i.e. antenna(s)] shall be used to connect to the test equipment.
© ISO/IEC 2019 – All rights reserved
---------------------- Page: 9 ----------------------
ISO/IEC DIS 19823-16:2019(E)

A sense antenna shall not affect test results; appropriate distances (e.g. 30 cm), antenna sizes and types (e.g.

patch antenna), as well as antenna polarization (i.e. circular polarization) shall be used. The antenna

configuration and distance shall be included in the test report.

To set up a tag with the test pattern and operational modes one of two methods shall be used (combinations

shall also be possible):
— an implemented test mode,
— an interrogator for initializing the appropriate operational mode.

Unless otherwise stated, all tests related frequency of the reference carrier shall be conformance with Sub-

clause 9.3.1 in ISO/IEC 18000-4.
5.2.3 Test equipment

All tests shall be done with commercial test equipment. In addition to the measurement devices described

below appropriate devices such as power supplies, splitters, combiners and cables shall be used.

The reference point for all measurements shall be either (temporary) antenna connector(s), or appropriate

coupling device(s). The reference point shall be documented in the test report.
5.2.3.1 Spectrum analyser

A spectrum analyser with the capability of digital demodulating and vector signal analysis capability shall be

used. Appropriate trigger functionality shall be either implemented in the spectrum analyser or generated

externally with additional measurement devices.
5.2.3.2 Signal generator

A signal generator for the 2.45 GHz band shall be used to generate an interrogator output signal for testing

tags. The signal level for the tests shall be within the operational range of the receiver input of the tag. The

input level shall be specified by the tag manufacturer and shall be documented in the test report.

5.2.3.3 Logic analyser

A logic analyser shall be used for verification of the correct data. Therefore, the analyser shall be capable of

storage of sequent samples in 0.5 second.
6 Test methods in respect to the ISO/IEC 29167-16 interrogators and tags
6.1 Test map for optional features

Table 1 lists all optional features of this crypto suite and shall be used as template to report the test results.

Furthermore, it is used to refer to the test requirements in subclause 6.2.
Table 1 — Test map for optional features
# Feature Additional requirement Mark items to be tested for Test results
supplied product
1 Mutual Shall be tested with the authenticate
command of the declared ISO/IEC 18000
Authentication
without TTP part
involved
Mutual Shall be tested with the authenticate
Authentication command of the declared ISO/IEC 18000
© ISO/IEC 2019 – All rights reserved
---------------------- Page: 10 ----------------------
ISO/IEC DIS 19823-16:2019(E)
with TTP part
involved
3 Authenticate Shall be tested with the AuthComm
communication command of the declared ISO/IEC 18000
part
4 Secure Shall be tested with the SecureComm
communication command of the declared ISO/IEC 18000
part

Table 2 lists all crypto suite requirements that shall be tested in dependence of the features of Table 1 as

supported by device under test. Items marked with M are mandatory and shall be tested for each device under

test.
6.2 Crypto suite requirements
This sub-clause contains all requirements of ISO/IEC 29167-16.
6.2.1 Crypto suite requirements of ISO/IEC 29167-16 in clauses 1 - 6

All the requirements of ISO/IEC 29167-16 in chapter 1-6 are mandatory, inherently by design only.

6.2.2 Crypto suite requirements of ISO/IEC 29167-16 in clauses 7 - 11
Table 2 contains all requirements of ISO/IEC 29167-16 in clauses 7 – 11.
The column MO (Mandatory / optional) has the following content:
M mandatory
Items marked with "M" are mandatory and shall be tested for all devices.
O optional

Items marked with "O" are optional and shall be tested only for devices that support the feature that is

indicated by the requirement.
Table 2 — Crypto suite requirements
Item Protocol Requirement MO Applies To How Verified
Subclause
1 7.1 ECDHP: M Interrogator By design
Tag
ECDH parameter, consist of parameter
ID, parameter length and parameter
content three parts, where the
parameter ID shall be 8 bits; parameter
shall be 16 bits in length and indicates
the number of bytes in the parameter
content. The values of ECDH parameter:
1)01 : The field value shall be
denoted by OIDs. The Length
subfield indicates the number of
octets of OIDs. The values of
Content subfield are the content
of OIDs.
2) Other: All other values are RFU.
2 7.1 M Interrogator By design
MK[127:0]
© ISO/IEC 2019 – All rights reserved
---------------------- Page: 11 ----------------------
ISO/IEC DIS 19823-16:2019(E)
Tag
Master key
3 7.1 MICt[255:0] M Tag By design
Message integrity code generated by
the tag, the length shall be 256 bits.
4 7.1 RN [63:0] M Tag By design
64-bit random number generated by
the tag
5 7.1 Sigt[383:0] M Tag By design
Digital signature generated by the
tag.The length shall be 384 bits.
6 7.1 TPKt[391:0] M Tag By design
Temporary public key generated by
tag, the length shall be 392 bits.
7 7.1 M Tag By design
X [391:0]
Temporary private key generated by
tag and used for ECDH exchange.
8 7.1 MIC [255:0] M Interrogator By design
Message integrity code generated by
the interrogator, the length shall be
256 bits.
9 7.1 RNi[63:0] M Interrogator By design
64-bit random number generated by
the interrogator.
10 7.1 Sigi[383:0] M Interrogator By design
Digital signature generated by the
interrogator.The length shall be 384
bits.
11 7.1 TPK [391:0]
i M Interrogator By design
Temporary public key generated by
interrogator, the length shall be 392
bits.
12 7.1 M Interrogator By design
X [391:0]
Temporary private key generated by
interrogator and used for ECDH
exchange.
13 7.2 M Interrogator By design
Cert Type shall be 4 bits, Value shall
Tag
be:
a) 0000:Value subfield contains
X.509 certificate of Interrogator,
Cert ;
b) 0001:Value subfield contains
X.509 certificate of Tag, Cert ;
c) 0010:Value subfield contains
X.509 certificate of TTP, Cert ;
ttp
d) Other: All other values are RFU.
14 8 M Tag By design
A transition to Ready state shall also
cause a reset of all variables used by
the crypto suite.
© ISO/IEC 2019 – All rights reserved
---------------------- Page: 12 ----------------------
ISO/IEC DIS 19823-16:2019(E)
15 9 M Tag By design
Implementations of this crypto suite
shall assure that all memory used for
intermediate results is cleared after
each operation (message-response
pair) and after reset.
16 10.2.1 The crypto suite shall parse the M Interrogator By demonstration
using Test pattern
Messages and process the data based
3,4,7 and 8
on the value of CSI, which is the first
parameter of all commands.
17 10.2.2 M Interrogator By demonstration
The FN shall be 8 bits.
using Test pattern
3,4,7 and 8
18 10.2.2 M Interrogator By demonstration
The IID shall be 64 bits.
using Test pattern
3,4,7 and 8
19 10.2.2 M Interrogator By demonstration
The following sections of this
using Test pattern
document describe the formatting of
3,4,7 and 8
Message and Response for
authentication. AuthType shall be
"00".
20 10.2.2 M Interrogator By demonstration
In MAM1.1 Message, AuthStep shall
using Test pattern
be "000".
3,4,7 and 8
21 10.2.2 M Interrogator By demonstration
If TTP not to be involved, TTPID shall
using Test pattern
be "0000 0000", or
3,4,7 and 8
If TTP to be involved, TTPID shall be
"0000 0001".
By demonstration
22 10.2.2 M Interrogator
ECDH parameter shall be 01 .
using Test pattern
3,4,7 and 8
23 10.2.3 The FN shall be 8 bits. M Tag By demonstration
using Test pattern
1,2,5 and 6
24 10.2.3 M Tag By demonstration
The IID shall be 64 bits.
using Test pattern
1,2,5 and 6
By demonstration
25 10.2.3 TTPID is the same as the one in the M Tag
using Test pattern
MAM1.1 Message.
1,2,5 and 6
26 10.2.3 ECDH parameter shall be 01 . M Tag By demonstration
using Test pattern
1,2,5 and 6
27 10.2.4 M Interrogator By demonstration
The FN shall be 8 bits.
using Test pattern 4
and 8
By demonstration
28 10.2.4 The following sections of this M Interrogator
using Test pattern 4
document describe the formatting of
and 8
Message and Response for
authentication. AuthType shall be
"00".
29 10.2.4 M Interrogator By demonstration
In MAM1.2 Message, AuthStep shall
© ISO/IEC 2019 – All rights reserved
---------------------- Page: 13 ----------------------
ISO/IEC DIS 19823-16:2019(E)
using Test pattern 4
be "001".
and 8
30 10.2.4 O Interrogator By demonstration
AuthRes: This field shall be present
using Test pattern 4
while if TTPID = "0000 0000" in
and 8
MAM1.1 Message; otherwise, this
field is not present.
31 10.2.5 M Tag By demonstration
The FN shall be 8 bits.
using Test pattern 2
and 6
32 10.3.1 M Interrogator By design
The tag should have ECC-based
private key S and the related
t Tag
certificate Cert. The interrogator shall
have ECC-based private key S and the
related certificate Cert .
33 10.3.1 M Interrogator By design
For the implementation of this crypto
suite an air interface protocol shall
Tag
support security commands that allow
the exchange of data between the
Interrogator and the Tag that has this
crypto suite implemented. The security
command contains a message with
parameters for the crypto suite. The
reply of the Tag contains a response
with the data that is returned by the
crypto suite.
Authenticate (MAM1.1 Message) and
MAM 1.1 Response, Authenticate
(MAM1.2 Message) and MAM 1.2
Response shall be implemented (see
Figure 3, ISO/IEC 29167-16).
34 10.3.2 M Interrogator By demonstration
Transmits command Authenticate
using Test pattern
(MAM1.1 Message) to the tag (See
3,4,7 and 8
Table 4, ISO/IEC 29167-16).
35 10.3.2 If TTPID in Authenticate (MAM1.1 O Tag By design
Message) is not "0000 0000" or "0000
0001", the authentication failed. The
Tag shall remain in the Ready state.
Transmits MAM1.1 Response to the
36 10.3.2 M Tag By design
interrogator (See Table 5, ISO/IEC
29167-16).
Sig = ECDSA
37 10.3.2 M Tag By design
(S ,TID||IID||Cert ||TTPID||RN ||TPK ||E
t t t t
CDHP).
After returning the MAM1.1
38 10.3.2 M Tag By design
Response, the Tag shall remain in the
Authenticate state.
© ISO/IEC 2019 – All rights reserved
---------------------- Page: 14 ----------------------
ISO/IEC DIS 19823-16:2019(E)
Check whether the values of TTPID
39 10.3.2 M Interrogator By design
and ECDHP in MAM1.1 Response are
equal to the values of TTPID and
ECDHP in Authenticate (MAM1.1
Message). If not, the authentication
failed.
Use Q extracted from certificate Cert
t t
40 10.3.2 M Interrogator By design
to verify Sig . If failed, the
authentication failed
Generates X and TPK, uses X and
i i i
41 10.3.2 M Interrogator By design
TPK to perform the ECDH
computation gets (X •TPK )abscissa,
i t
computes KD-HMAC-
SHA256((X •TPK)abscissa, RN ||RN )
i t t i
to generate a 128 bits MK.
Computes KD-HMAC-SHA256 (MK,
42 10.3.2 M Interrogator By design
TID||IID||RN ||RN) to generate 128
t i
bits IAK, 128 bits SIK and 128 bits
SEK.
Transmits Authenticate (MAM1.2
43 10.3.2 M Interrogator By demonstration
using Test pattern 4
Message) to tag (See Table 6, ISO/IEC
and 8
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.