All Encryption shall be Authenticated Encryption which:
shall use the cryptographic primitives, input value structures and cryptographic material specified in Section 4; and
shall, for Key Agreement, use the Key Agreement key pair of the Device and the Remote Party which is accessing the data item.
A Device shall, where it stores a data item listed in the Mapping Table as Encrypted, only provide that data in a Remote Party Message in Encrypted form.
Where the Encrypted data item is within a Log, a Command requesting that data shall always have ‘from’ and ‘to’ date-times specified.
Where all the octets in the ‘from’ date-time are 0x00 (excluding the least significant 3 bytes in Blue Book octet string formatted date-times), the Device shall interpret the ‘from’ field as meaning from the oldest in the Log.
Where all the octets in the ‘to’ date-time are 0xFF (excluding the least significant 3 bytes in Blue Book octet string formatted date-times), the Device shall interpret the ‘to’ field as meaning to the newest in the Log.
Where the Encrypted data item in the Mapping Table is not in a Log, a Command requesting that data shall never have ‘from’ or ‘to’ date-times specified.
Share with your friends: |