A Survey on Implementing Public Key Cryptography on RFID Tags
نویسندگان
چکیده
Radio Frequency Identification (RFID) is an emerging technology, which brings enormous productivity benefits in applications, where objects have to be identified automatically. This paper presents issues concerning security and privacy of RFID systems. RFID tags are a new generation of barcodes with added functionality. The risk related to using the tags for several applications. In particular if no appropriate cryptography measures are taken, the privacy of a user carrying tagged items can be severely damaged. To enable these applications and at the same time minimize the risks, Public Key Cryptography (PKC) offers attractive solution. We focus on the problem of anti-counterfeiting measures that can be provided by RFID tags. PKC –based identification protocols are useful for this application. Keywords— RFID, Authentication, public key cryptography, WIPR
منابع مشابه
A Sub-0.5V Lattice-Based Public-Key Encryption Scheme for RFID Platforms in 130nm CMOS
Implementing public-key cryptography on passive RFID tags is very challenging due to the limited die size and power available. Typical public-key algorithms require complex logical components such as modular exponentiation in RSA. We demonstrate the feasibility of implementing public-key encryption on low-power, low cost passive RFID tags to large-scale private identification. We use Oded Regev...
متن کاملCan Jannie verify? Usability of display-equipped RFID tags for security purposes
The recent emergence of RFID tags capable of performing public key operations enables a number of new applications in commerce (e.g., RFID-enabled credit cards) and security (e.g., ePassports and access-control badges). While the use of public key cryptography in RFID tags mitigates many difficult security issues, certain important usability-related issues remain, particularly when RFID tags ar...
متن کاملUsability of Display-Equipped RFID Tags for Security Purposes
The recent emergence of RFID tags capable of performing public key operations has enabled a number of new applications in commerce (e.g., RFIDenabled credit cards) and security (e.g., ePassports and access-control badges). While the use of public key cryptography in RFID tags mitigates many difficult security issues, certain important usability-related issues remain, particularly when RFID tags...
متن کاملCHECK THE DATE: Reader Revocation in PKI-Based RFID Systems
One prominent open problem with RFID tags that support public key cryptography is revocation of reader certificates. This is an important issue considering that highend RFID tags are geared for public key applications such as e-documents and contactless payment instruments. Furthermore, the problem is unique to public key-based RFID systems, since tags have no clock and thus cannot use traditio...
متن کاملUsing Elliptic Curves on RFID Tags
We present a concept for the realization of asymmetric cryptographic techniques in light-weight cryptographic devices and describe an implementation based on elliptic curve cryptography which can be used for authentication in mass applications of RFID tags. Our schemes offer advantages in large decentralized applications with many unobservable readers in the field over previous solutions. Moreo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014