Coupon Recalculation for the Schnorr and GPS Identification Scheme: A Performance Evaluation
نویسندگان
چکیده
One of the most important challenges in the last few years has been the integration of authentication services to low-cost RFID tags. Especially elliptic-curve-based implementations have proven to be a good option for asymmetric and light-weight cryptography. In this article, we evaluate two elliptic-curve based versions of the Schnorr and GPS identification schemes that have been designed for use in resource-constrained environments. Both schemes have been implemented on an RFID-tag prototype that runs at 13.56 MHz. Our results show that if the schemes make use of a pre-computation approach using coupons, Schnorr leads to a higher performance in terms of memory consumption, computational complexity, and communication bandwidth. Furthermore, we show that the challenge-response calculation of the Schnorr identification scheme can be performed even within the frame-delay timings of most common RFID standards such as ISO/IEC 14443 and ISO/IEC 15693 which encourages the use of Schnorr in scenarios where coupons are recalculated on the tag to allow fast and ”on-the-fly” authentication.
منابع مشابه
Coupon Recalculation for the GPS Authentication Scheme
Equipping branded goods with RFID tags is an effective measure to fight the growing black market of counterfeit products. Asymmetric cryptography is the technology of choice to achieve strong authentication but suffers from its ample demand of area and power resources. The GPS authentication scheme showed that a coupon-based approach can cope with the limited resources of passive RFID tags. Thi...
متن کاملAnalysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy
Privacy of RFID systems is receiving increasing attentions in the RFID community and an important issue required as to the security of RFID system. Backward privacy means the adversary can not trace the tag later even if he reveals the internal states of the tag sometimes before. In this paper, we analyze two recently proposed RFID authentication schemes: Randomized GPS and Randomized Hashed GP...
متن کاملIntegration Scheme for SINS/GPS System Based on Vertical Channel Decomposition and In-Motion Alignment
Accurate alignment and vertical channel instability play an important role in the strap-down inertial navigation system (SINS), especially in the case that precise navigation has to be achieved over long periods of time. Due to poor initialization as well as the cumulative errors of low-cost inertial measurement units (IMUs), initial alignment is not sufficient to achieve required navigation ac...
متن کاملProvably Secure and Practical Identification Schemes and Corresponding Signature Schemes
This paper presents a three-move interactive identification scheme and proves it to be as secure as t h e discrete logarithm problem. This provably secure scheme is almost as efficient as t,he Schnorr identification scheme, while the Schnorr scheme is not provably secure. This paper also presents another practical identification scheme which is proven to be as secure as the factoring problem ar...
متن کاملTwin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme
Most identity-based identification (IBI) schemes proposed in recent literature are built using pairing operations. This decreases efficiency due to the high operation costs of pairings. Furthermore, most of these IBI schemes are proven to be secure against impersonation under active and concurrent attacks using interactive assumptions such as the one-more RSA inversion assumption or the one-mor...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009