Improved (and Practical) Public-Key Authentication for UHF RFID Tags

نویسندگان

  • Sébastien Canard
  • Loïc Ferreira
  • Matthew J. B. Robshaw
چکیده

CRYPTOGPS has been promoted as a public-key technology suitable for UHF RFID tag authentication. Since it is a classical commitment-challengeresponse (CCR) scheme, it can be converted into a signature scheme using the transformation proposed by Fiat and Shamir. Previously this signature variant has not been considered for RFID, but in this paper we show how to achieve this transformation in a way that yields a compact and efficient scheme. Further, the three-pass CCR scheme is turned into a regular challenge-response scheme with the attendant protocol and implementation improvements. Since we use a block cipher rather than a hash function for the transformation, we justify our approach using results in the ideal cipher model and the net result is a variant of CRYPTOGPS that offers asymmetric UHF tag authentication with reduced communication and protocol complexity.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure UHF Tags with Strong Cryptography - Development of ISO/IEC 18000-63 Compatible Secure RFID Tags and Presentation of First Results

This paper presents a concept for an UHF tag supporting cryptographically strong authentication which is based on the Rabin-Montgomery public key cryptosystem in accordance with the framework of ISO/IEC 29167-1. It uses an easily computable long integer square operation for the public key encryption of a tag ID record. Only a legitimate interrogator who is in possession of the private key can d...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme

Cloned fake RFID tags and malicious RFID readers pose a major threat to RFID-based supply chain management system. Fake tags can be attached to counterfeit products and medicines. Malicious readers can corrupt and snoop on genuine tags. These threats can be alleviated by incorporating a RFID tag-reader mutual authentication scheme. In this paper we propose a simple, cost-effective, light-weight...

متن کامل

User-aided reader revocation in PKI-based RFID systems

Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and payment instruments. In this context, public key certificates form the cornerstone of the overall system security. In this paper, we argue that one of the prominent challenges is how to handle revocation and expiration checkin...

متن کامل

Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems

Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and payment instruments. In this context, public key certificates form the cornerstone of the overall system security. In this paper, we argue that one of the prominent -and still woefully unaddressedchallenges is how to handle re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012