Cryptography and Authentication on RFID Passive Tags for Apparel Products Kirk H.M. Wong, Patrick C.L. Hui, and Allan C.K....
Outline <ul><li>Introduction of RFID ( Radio Frequency Identification )  </li></ul><ul><li>The proposed scheme for data pr...
Introduction (1/3) <ul><li>Passive tags: </li></ul><ul><ul><li>only function when powered by a nearby reader </li></ul></u...
Introduction (2/3) <ul><li>Standards of RF devices: </li></ul><ul><ul><li>HF bands:  ISO 14443, ISO 15693 </li></ul></ul><...
Introduction (3/3) <ul><li>Electronic Product Code (EPC): </li></ul><ul><ul><li>64-bit or 96-bit length </li></ul></ul><ul...
The proposed scheme (1/4) <ul><li>e.g. 64-bit EPC </li></ul>
The proposed scheme (2/4) <ul><li>Preparing phase  (for 64-bit EPC): </li></ul>(pseudo-EPC) tag’s memory reserved tag’s me...
The proposed scheme (3/4) <ul><li>Read phase  : </li></ul>Tag (i) POS (Reader) Back end (Database) “ Request” “ EPC Read”
The proposed scheme (4/4) <ul><li>Authentication phase  : </li></ul>Unlock successfully Tag (i) POS (Reader) Back end (Dat...
Performance analysis
Comments on the proposed scheme (1/4) <ul><li>Use different private keys  K pr ( i )   to encrypt each  EPC ( i )  may cau...
Comments on the proposed scheme (2/4) <ul><li>Using the same private key  K pr  and  n  to encrypt each  EPC ( i )  may su...
Comments on the proposed scheme (3/4) <ul><li>Known-plaintext attack : </li></ul>
Comments on the proposed scheme (4/4)
Conclusions <ul><li>In this article, the authors proposed a scheme for data protection on passive RFID tags. </li></ul><ul...
Upcoming SlideShare
Loading in...5
×

Department of Computer Science and Information Engineering

277

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
277
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Department of Computer Science and Information Engineering"

  1. 1. Cryptography and Authentication on RFID Passive Tags for Apparel Products Kirk H.M. Wong, Patrick C.L. Hui, and Allan C.K. Chan The Hong Kong Polytechnic University, Hong Kong, PR China Computers in Industry, vol.57, no.4, May 2006, pp. 342-349 Speaker: Chia-Yin Lee
  2. 2. Outline <ul><li>Introduction of RFID ( Radio Frequency Identification ) </li></ul><ul><li>The proposed scheme for data protection on passive RFID tags </li></ul><ul><li>Performance analysis </li></ul><ul><li>Comments on the proposed scheme </li></ul><ul><li>Conclusions </li></ul>
  3. 3. Introduction (1/3) <ul><li>Passive tags: </li></ul><ul><ul><li>only function when powered by a nearby reader </li></ul></ul><ul><li>Semi-passive tags: </li></ul><ul><ul><li>has an internal power, but is typically dormant until triggered into activity </li></ul></ul><ul><li>Active tags: </li></ul><ul><ul><li>self-powered, and interacts with to communicate </li></ul></ul>
  4. 4. Introduction (2/3) <ul><li>Standards of RF devices: </li></ul><ul><ul><li>HF bands: ISO 14443, ISO 15693 </li></ul></ul><ul><ul><li>UHF bands: EPC Class-1 Gen-2 </li></ul></ul>
  5. 5. Introduction (3/3) <ul><li>Electronic Product Code (EPC): </li></ul><ul><ul><li>64-bit or 96-bit length </li></ul></ul><ul><li>The EPC system defines several classes of products: </li></ul>
  6. 6. The proposed scheme (1/4) <ul><li>e.g. 64-bit EPC </li></ul>
  7. 7. The proposed scheme (2/4) <ul><li>Preparing phase (for 64-bit EPC): </li></ul>(pseudo-EPC) tag’s memory reserved tag’s memory (PIN)
  8. 8. The proposed scheme (3/4) <ul><li>Read phase : </li></ul>Tag (i) POS (Reader) Back end (Database) “ Request” “ EPC Read”
  9. 9. The proposed scheme (4/4) <ul><li>Authentication phase : </li></ul>Unlock successfully Tag (i) POS (Reader) Back end (Database) “ Ack”
  10. 10. Performance analysis
  11. 11. Comments on the proposed scheme (1/4) <ul><li>Use different private keys K pr ( i ) to encrypt each EPC ( i ) may cause collision. </li></ul><ul><li>For implementation, it might use the same private key K pr to encrypt each EPC ( i ) . </li></ul>EPC ( i ) K pr ( i ) key ( i )
  12. 12. Comments on the proposed scheme (2/4) <ul><li>Using the same private key K pr and n to encrypt each EPC ( i ) may suffer from known-plaintext attack . </li></ul><ul><li>If we can collect two ( EPC ( i ) , key ( i ) * ) pairs, then we can easy to find out the private key K pr . </li></ul>
  13. 13. Comments on the proposed scheme (3/4) <ul><li>Known-plaintext attack : </li></ul>
  14. 14. Comments on the proposed scheme (4/4)
  15. 15. Conclusions <ul><li>In this article, the authors proposed a scheme for data protection on passive RFID tags. </li></ul><ul><li>The proposed scheme adopts the Jigsaw concept to encrypt the EPC on tags. </li></ul><ul><li>The proposed scheme may suffer from known-plaintext attack. </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×