Using Elliptic Curves on RFID Tags
نویسندگان
چکیده
We present a concept for the realization of asymmetric cryptographic techniques in light-weight cryptographic devices and describe an implementation based on elliptic curve cryptography which can be used for authentication in mass applications of RFID tags. Our schemes offer advantages in large decentralized applications with many unobservable readers in the field over previous solutions. Moreover, using public key techniques cryptographic protocols that protect the privacy of the tag bearer can be easily implemented.
منابع مشابه
An Elliptic Curve Processor Suitable For RFID-Tags
RFID-Tags are small devices used for identification purposes in many applications nowadays. It is expected that they will enable many new applications and link the physical and the virtual world in the near future. Since the processing power of these devices is low, they are often in the line of fire when their security and privacy is concerned. It is widely believed that devices with such cons...
متن کاملWide-weak Privacy Preserving RFID Mutual Authentication Protocol
Radio Frequency IDentification (RFID) systems are gaining enormous interests at industry due to their vast applications such as supply chain, access control, inventory, transport, health care and home appliances. Although tag identification is the primary security goal of an RFID system, privacy issue is equally, even more, important concern in RFID system because of pervasiveness of RFID tags....
متن کاملRFID Authentication Protocols based on Elliptic Curves - A Top-Down Evaluation Survey
Authentication of RFID tags is a challenging task due to the resource-constrained environment they are operating in. In this article, we present a top-down evaluation survey for RFID-tag authentication based on elliptic curves. First, we describe a general model to characterize different state-of-the-art public-key techniques that provide entity and message authentication. Second, we present pr...
متن کاملYet Another Strong Privacy-Preserving RFID Mutual Authentication Protocol
Radio Frequency IDentification (RFID) systems are gaining enormous interests in industry due to their vast applications such as supply chain, access control, inventory, transport, health care and home appliances. Although tag identification is the primary security goal of an RFID system, privacy issue is equally, even more important concern in the RFID system because of pervasiveness of RFID ta...
متن کاملSecurity and privacy in RFID systems. (Sécurité et protection de la vie privée dans les systèmes RFID)
While RFID systems are one of the key enablers helping the prototype of pervasive computer applications, the deployment of RFID technologies also comes with new privacy and security concerns ranging from people tracking and industrial espionage to product cloning and denial of service. Cryptographic solutions to tackle these issues were in general challenged by the limited resources of RFID tag...
متن کامل