Bourgogne ET Grasset SAS VEGRDE2 User Manual
Vegas Long Range Read/Write Device
27-07-2002
Vegrde3/EG
Confidentiality Level 1
Page 38 (48)
Bourgogne et Grasset -– ZI Beaune Savigny -– 21200 Beaune – France – Tel. +33 380 26 26 26 – Fax. +33 3 80 26 26 00
(this check is carried out in the HITAG VEGAS read/write device)
Security of the data read from the data carrier by the HITAG VEGAS read/write device remains
with the user for reasons of flexibility. Therefore, you can choose flexible check sums and store
them in the EEPROM together with the data. You can protect sensitive data better than less
sensitive data, thus permitting optimized operation times.
with the user for reasons of flexibility. Therefore, you can choose flexible check sums and store
them in the EEPROM together with the data. You can protect sensitive data better than less
sensitive data, thus permitting optimized operation times.
Detailed instructions how to use and calculate Cyclic Redundancy Check (CRC) are available at
Mikron in a document named: HITAG VEGAS - Contactless Data Transmission, Data Reliability
and Integrity.
Mikron in a document named: HITAG VEGAS - Contactless Data Transmission, Data Reliability
and Integrity.
4.3. Data Privacy
The use of cryptography (Stream Cypher), mutual authentication, and password verification
prevents any possibility of monitoring and copying the data channel. This guarantees highest
possible data security in the secret area of the data carrier.
To make use of cryptography you need secret data: keys and logdata.
prevents any possibility of monitoring and copying the data channel. This guarantees highest
possible data security in the secret area of the data carrier.
To make use of cryptography you need secret data: keys and logdata.
Keys are used to initialize the crypto block
and
logdata are used for mutual authentication.
The data carriers and the HITAG VEGAS read/write device are provided with identical transport
keys and transport logdata ex Mikron so that you can start operating them right away.
keys and transport logdata ex Mikron so that you can start operating them right away.
In order to offer our OEM clients high flexibility, the configuration of the data carrier memory,
password, keys and logdata can be changed. (See Chapter 14, Personalization).
password, keys and logdata can be changed. (See Chapter 14, Personalization).
We strictly recommend to rigorously restrict these possibilities for the end customers (by setting
the configuration page to read only, setting password, keys and logdata to neither read nor
write).
the configuration page to read only, setting password, keys and logdata to neither read nor
write).