CMOS THz-ID: A 1.6-mm² Package-Less Identification Tag Using Asymmetric Cryptography and 260-GHz Far-Field Backscatter Communication
نویسندگان
چکیده
This article presents an ultra-small, high-security identification tag that is entirely built in a CMOS chip without external components. The usage of backscatter communications at 260 GHz enables full integration 2 × patch antenna array. For compactness and minimum interference caused by direct wave reflection, the signal frequency-shifted MHz radiated with cross polarization from same Such configuration also, for first time RF tags, beamsteering enhanced link budget. authentication secure wireless data transmission, also integrates compact elliptic-curve-cryptography (ECC) dedicated processor, which based on narrow-strong private protocol. presented has peak power consumption 21 μW can be powered chip-wide array photodiodes DC-DC converter. Using low-cost 65-nm bulk technology, terahertz (THz) ID area only 1.6 mm 2 demonstrates measured downlink speed 100 kb/s upload across 5-cm distance reader. tag-reader authentication/communication protocol fully demonstrated using partially tag-integrated photo-voltaic powering. size smallest among all prior radio-frequency identifications (RFIDs) far-field communications.
منابع مشابه
Secure Authentication through a near Field Communication in Asymmetric Cryptography
This paper presents the design and implementation of a complete near-field communication (NFC) tag system that supports highsecurity features. The tag design contains all hardware modules required for a practical realization, which are: an analog 13.56-MHz radio-frequency identification (RFID) front-end, a digital part that includes a tiny (programmable) 8-b microcontroller, a framing logic for...
متن کاملAsymmetric Cryptography: Hidden Field Equations
The most popular public key cryptosystems rely on assumptions from algebraic number theory, e.g., the difficulty of factorisation or the discrete logarithm. The set of problems on which secure public key systems can be based is therefore very small: e.g., a breakthrough in factorisation would make RSA insecure and hence affect our digital economy quite dramatically. This would be the case if qu...
متن کاملMine Field Detection and Identification Using THz Spectroscopic Imaging
The spatial, temporal, and spectroscopic characteristics associated with pulsed THz (100 GHz –70 THz) radiation provide this emerging technology with the potential for reliable identification of buried objects such as non-metallic landmines. With a suitable integration of these attributes, one can envision a THz detection platform that provides: (1) accurate identification of buried objects, an...
متن کاملSecurity-enabled NFC Tag with Flexible Architecture Supporting Asymmetric Cryptography
©2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. DOI: http://dx...
متن کاملID-based cryptography using symmetric primitives
A general method for deriving an identity-based public key cryptosystem from a one-way function is described. We construct both ID-based signature schemes and ID-based encryption schemes. We use a general technique which is applied to multi-signature versions of the one-time signature scheme of Lamport and to a public key encryption scheme based on a symmetric block cipher which we present. We ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Journal of Solid-state Circuits
سال: 2021
ISSN: ['0018-9200', '1558-173X']
DOI: https://doi.org/10.1109/jssc.2020.3015717