SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 1, Ver. 1 (Jan - Feb. 2015), PP 70-74
www.iosrjournals.org
DOI: 10.9790/2834-10117074 www.iosrjournals.org 70 | Page
RSA Algorithm as a Data Security Control Mechanism in RFID
Jonathan Sangoro1
Abstract: With Radio Frequency Identification (RFID), new uses of identification and collection of data about
tracking of items have been made possible; also, it is understandable that major interest is given to issues of
information security and privacy. Lack of assurance regarding data security is one of the remaining obstacles
for widespread usage of RFID (A. Juels and R. Pappu, 2004). RFID still can be done without security assurance
if individuals do not have to worry about forsaking their privacy. Many issues related to data security and
privacy within RFID systems is inherited through using already known technology and methods (Aljifri and
Tyrewalla, 2004). However there are many new issues, especially regarding personal data security that need to
be resolved and that is why I propose RSA algorithm to mitigate the data security challenges in RFID.
Keywords: RFID, Data security and RSA algorithm.
I. Introduction
Radio Frequency Identification (RFID) has been in use for the last one and a half decades.
Currently, RFID systems are usually available in low, high, ultra-high, and microwave frequencies with
passive, semi-passive (or semi-active) and active transponders or tags. Tags might be either Chipless, or contain
a microchip with read only, or read and write memory. The component controlling communication in a RFID
system is called a reader or interrogator, which can be stationary or portable depending on the application. In
order for the tags to transmit their data, the tags must be in the reader’s field or interrogation zone, and receive
the necessary energy (in form of radio waves) from the reader.
Some of the key areas where RFID has been applied is; libraries, publishing, military, hospitals, asset
management and livestock tracking.
Challenges to RFID technology
Although promising, RFID is not without its challenges, which arise from both a technological and usage point
of view.
Security
Security is a key issue in RFID. People who use devices that carry personal information, such as credit
card or other ID numbers, do not want others to access their accounts. These are significant security
vulnerabilities in RFID and can lead to harm or losses.
Privacy
Another common concern with RFID is privacy. It is disconcerting for many people to have their
movements or buying habits automatically tracked electronically. Many privacy groups are concerned about the
ability to identify people as they walk through a store or shopping center via the tags embedded in their clothing
and linked to them at the time of purchase.
Security Issues in RFID data communication
The communications between the components of RFID systems also suffer from security issues.
Nevertheless, the level of vulnerability significantly differs from communication between the tag and the reader
to communication between the reader and back-end system. Some of the security issues in the communication
between the tag and the reader are listed below.
1. Eavesdropping.
The communication between reader and tags via the air interface can be monitored by intercepting and
decoding the radio signals. This is one of the most common threats to RFID systems. The eavesdropped
information could for example be used to collect sensitive information about a person. It could also be used
to perform a replay attack.
2. Replay Attack.
The attacker can obtain and save all the exchanged messages between a tag and reader and either simulate
the tag or the reader towards one another tag to access it’s data.
Rsa Algorithm As A Data Security Control Mechanism In Rfid
DOI: 10.9790/2834-10117074 www.iosrjournals.org 71 | Page
3. Man-in-the-middle.
A man-in-the-middle attack is a form of attack in which the adversary provokes or manipulates the
communication between the reader and the tag, where manipulating the communication means relay,
withhold, or insert messages.
4. Cloning Attack:
The attacker reads the tag’s information and copies it to another tag to impersonate the original tag. The
backend server in this case cannot recognize the original tag from the fake one. This attack is typically a
physical layer attack and that makes it hard to prevent.
Existing Solutions to Data Security
Kill Tag
By executing a special “kill” command on a tagged product, the RFID tag will be “killed” and can
never be reactivated. This “kill” command may disconnect the antenna or short circuit fuse. This ensures that the
tag cannot be detected any further, and thus protects the privacy of the individual who possesses the product.
But there are instances where a tag may need to be re-activated for examples when a customer returns a
previously bought default item back to the store if the item is faulty, what happens then?
Faraday cage
An RFID tag can be shielded with a container made of metal mesh or foil, known as a “Faraday Cage”.
This foil lined container can block radio signals of certain frequencies and thus protect tagged products from
being detected. However, this approach might not work in some situations. For example, it is difficult to wrap
foil-lined containers around tags used in clothing for pets and people, or the goods in the supermarkets cannot
all have their tags wrapped in a faraday cage for obvious reasons, it would be too expensive.
Active Jamming
Active jamming of RF signals refers to the use of a device that actively broadcasts radio signals in
order to disrupt the operation of any nearby RFID readers. This physical means of shielding may disrupt nearby
RFID systems. But if the jamming signal is too strong, there is a risk of disruption to all nearby RFID systems.
“RSA” Selective Blocker Tag
A blocker tag is a passive RFID device that uses a sophisticated algorithm to simulate many ordinary
RFID tags simultaneously. It provides an endless series of responses to RFID readers through the use of two
antennas to reflect back two bits simultaneously, thereby preventing other tags from being read, performing a
kind of passive jamming.
However, this approach gives individuals a lot of control. In addition, a blocker tag may be used maliciously to
circumvent RFID reader protocols by simulating multiple tag identifiers.
RSA Algorithm
Introduction
Rivest Shamir Aldeman (RSA) algorithm is based on the difficulty of factorizing large numbers that
have 2 and only 2 factors which are Prime numbers. The system works on a public and private key system. The
public key is made available to everyone. With this key a user can encrypt data but cannot decrypt it, the only
person who can decrypt it is the one who possesses the private key. It is theoretically possible but extremely
difficult to generate the private key from the public key. This makes the RSA algorithm a very popular choice in
data encryption.
The Algorithm
First of all, two large distinct prime numbers p and q must be generated. The product of these, we call n is a
component of the public key. It must be large enough such that the numbers p and q cannot be extracted from it.
It must be 512 bits at least i.e. numbers greater than 10154
. We then generate the encryption key e which must be
co-prime to the number m =  (n) = (p - 1) (q - 1). We then create the decryption key d such that de mod m =
1. We now have both the public and private keys.
Encryption
We let y = E(x) be the encryption function where x is an integer and y is the encrypted form of x
y = xe
mod n
Decryption
We let X = D(y) be the decryption function where y is an encrypted integer and X is the decrypted form of y
Rsa Algorithm As A Data Security Control Mechanism In Rfid
DOI: 10.9790/2834-10117074 www.iosrjournals.org 72 | Page
X = yd
mod n
Simple Example
a. We start by selecting primes p = 3 and q = 11.
b. n = p q = 33
2. m = (p - 1)(q - 1) = (2)(10) = 20.
3. Try e = 3
4. gcd (3; 20) = 1
5. e is co-prime to n
6. Find d such that 1 de mod m
7. 1 = Km + de
8. Using the extended Euclid Algorithm we see that 1 = -1(20) + 7(3)
9. d = 7
10. Now let’s say that we want to encrypt the number x = 9:
11. We use the Encryption function y = xe
mod n
a. = 93
mod 33
b. = 729 mod 33 3
12. y = 3
13. To decrypt y we use the function X = yd
mod n
X = 37
mod 33
X = 2187 mod 33  9
X = 9 = x It Works!
Example of RSA algorithm
Example 1
Let U = 5 and V = 11. This gives R a value of 55, and:
Phi (55) = (5 - 1) * (11 - 1) = 4 * 10 = 40.
Now, we need to find numbers to fit the equation:
P * Q = 1 (mod 40).
Let P=7
7 * Q = 1 (mod 40).
What would that make Q? If we rewrite this equation to get rid of the unfamiliar modulus arithmetic, we have:
7 * Q = K * 40 + 1, where K can be any number.
The first value for Q that works is 23:
7 * 23 = 161 = 4 * 40 + 1.
So we have 7 for P, our public key, and 23 for Q, our private key.
To make our cipher work, you may recall that the values we use for T must be less than R, and also relatively
prime to R. We also don't want to use 1 for T, because 1 raised to any power whatsoever is going to remain 1.
Table 1. conversion table
2 3 4 6 7 8 9 12 13 14 16 17 1
A B C D E F G H I J K L M
19 21 23 24 26 27 28 29 31 32 34 36 37
N O P Q R S T U V W X Y Z
38 39 41 42 43 46 47 48 49 51 52 53
Sp 0 1 2 3 4 5 6 7 8 9 *
The password we will encrypt is "VENIO"
V E N I O
31 7 19 13 21
Table 2. Conversion table
To encode it, we simply need to raise each number to the power of P modulo R.
V: 31^7 (mod 55) = 27512614111 (mod 55) = 26
E: 7^7 (mod 55) = 823543 (mod 55) = 28
N: 19^7 (mod 55) = 893871739 (mod 55) = 24
I: 13^7 (mod 55) = 62748517 (mod 55) = 7
O: 21^7 (mod 55) = 1801088541 (mod 55) = 21
Rsa Algorithm As A Data Security Control Mechanism In Rfid
DOI: 10.9790/2834-10117074 www.iosrjournals.org 73 | Page
So, our encrypted message is 26, 28, 24, 7, 21 -- or "RTQEO" in our personalized character set.
When the message "RTQEO" arrives on the other end of our insecure phone line, we can decrypt it simply by
repeating the process -- this time using Q, our private key, in place of P.
R: 26^23 (mod 55) = 350257144982200575261531309080576 (mod 55) = 31
T: 28^23 (mod 55) = 1925904380037276068854119113162752 (mod 55) = 7
Q: 24^23 (mod 55) = 55572324035428505185378394701824 (mod 55) = 19
E: 7^23 (mod 55) = 27368747340080916343 (mod 55) = 13
O: 21^23 (mod 55) = 2576580875108218291929075869661 (mod 55) = 21
The result is 31, 7, 19, 13, 21 -- or "VENIO", our original message.
Proposed Solution
The solution which I propose is an RSA password generated query to improve data security in RFID
and ensure that data cannot be accessed by any random reader or attacker that is transmitting radio signal. This
also prevents hacking, modification and eavesdropping of data stored in tags by malicious individuals who
know that as long as they have readers which transmit radio frequency they can always intercept data or prompt
data from tags even if the data stored in those tags is not intended for them. They then use this private data for
the own malicious intentions, blackmail or advantage by selling it to the highest competitor.
This improvement can be done by adding a script of code to the middleware or software that enables
communication or flow or data between the different components that make up and RFID system (tags, readers
and database).
Finally, this also solves the problem of multiple collision of data from different tags as only the tags
with the verified and authenticated password will be allowed to transmit it’s data while the rest of the tags will
be locked out.
How it works
Data security is enhanced by ensuring that the reader and the tag must first have RSA algorithm
encoded in the source code. This will ensure that before data transmission occurs, the reader will query the tag
to send it’s password, the tag will then send it’s password in ciphertext back to the reader for authentication and
verification. The reader then uses the private key in it’s possession to decrypt the ciphertext password back to
plaintext and quickly matches it to the password of that particular tag which is stored in the database. If the
password is correct then the corresponding requested data by the reader is transmitted in ciphertext form. Once
the reader receives this data, it quickly uses the private key in its possession to decode the data ciphertext to
plaintext.
Data Security requirements shall be incorporated in the reader such that if the tag sends its correct
encrypted password (in ciphertext) which is verified and authenticated then data transmission is allowed to
proceed from tag to reader and vice-versa, but if the password sent by the tag is wrong , further communication
between the tag and reader is blocked forthwith. The advantage is also cemented in the fact that RSA algorithm
is based on factorization of two large prime numbers which cannot be easily broken down or determined if one
does not have a private key.
II. Conclusion And Recommendation
While the use of RFID technology is increasing across a range of different industries, the associated
security and privacy issues need to be carefully addressed.
This paper recommends the use of public key encryption, RSA algorithm in particular is a robust
approach to mitigating the data security issues in RFID. This is due to the fact that RSA algorithm is based on
use of public and private keys which are used to encrypt data from plaintext to ciphertext and again decrypt the
ciphertext back to plaintext. This is the main reason for recommending RSA algorithm as a suitable mechanism
for mitigating data security in RFID applications. This is because an attacker who does not possess the correct
private key can never decrypt the correct password since the key he/she posses will decrypt the data, yes, but it
will be the wrong password and communication terminated henceforth.
This is a low cost technique of enhancing data security since no new equipment requires to be bought
but only a small script of code is added to the original software to append the RSA algorithm to the code for
data security enhancement.
References
[1]. A.Juels and R. Pappu, (2003), “Squealing euros: Privacy protection in RFID-enabled banknotes”, In proceedings of Financial
Cryptography – FC’03, LNCS, volume 2742, Springer-Verlag, pages 103-121.
[2]. Tanenbaum, D. Wetherall ”Computer Networks”2011.
[3]. AES page available via http://www.nist.gov/CryptoToolkit
Rsa Algorithm As A Data Security Control Mechanism In Rfid
DOI: 10.9790/2834-10117074 www.iosrjournals.org 74 | Page
[4]. Artz, Matthew (2003). City library adopts controversial RFID chips. Retrieved October 10, 2003, from
http://www.berkeleydaily.org/article.cfm?issue=10-10-3&storyID=17547
[5]. Auto-ID Center, (2002), “860MHz-960MHz Class I Radio Frequency Identification Tag Radio Frequency & Logical
communication Interface Specification Proposed Recommendation Version 1.0.0”, Technical Report MIT-AUTOID-TR-007,
November.
[6]. Booth-Thomas, Cathy (2003, October 20). The see-it-all chips. Time, 162 (15), 12-17
[7]. Chachra, Vinod (2003). Experiences in implementing RFID solutions in a multi-vendor
[8]. environment. IFLA Conference, Berlin, August, 2003. Retrieved August 15, 2003, from
[9]. http://www.ifla.org/IV/ifla69/paper/132e-chachra.pdf
[10]. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)
[11]. EPC Radio-Frequency Identity Protocols Generation 2 Identity Tag (Class 1):Protocol for Communications at 860 MHz-960 MHz.
EPC Global Hardware Action Group (HAG), EPC Identity Tag (Class 1) Generation 2, Last-call Working Draft Version 1.0.2,
2003-11-24.
[12]. FIPS 180-2. Secure Hash Standard, http://csrc.nist.gov/publications/, 2002
[13]. H. Aljifri, and N. Tyrewalla, (2004), “Security model for Intra-Domain Mobility Management Protocol”, Int. J. of Mobile
Communications, Vol. 2, No.2, pp. 157 – 170.
[14]. Hecht, Jeff (2004). Casino chips to carry RFID tags. New Scientist. Retrieved September 02, 2004, from
http://www.newscientist.com/news/news.jsp?id=ns99994542
[15]. Holmström, J., Ketokivi, K., Hameri, A.-P. (2009b), “Bridging Practice and Theory: A Design Science Approach”, Decision
Sciences, Vol. 40 No. 1, pp. 65-87.
[16]. Juels, A., Weis, S.A. (2005). Authenticating Pervasive Devices with Human Protocols.
[17]. Advances in Cryptology – Crypto ’05. Lecture Notes in Computer Science. Volume 3621. Pages 293-308.
[18]. W. Küchlin, “Public key encryption,” ACM SIGSAM Bulletin, August 1987, pp. 69-73.

More Related Content

What's hot

Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...eSAT Journals
 
Logic codes generation and transmission using an encoding decoding system
Logic codes generation and transmission using an encoding decoding systemLogic codes generation and transmission using an encoding decoding system
Logic codes generation and transmission using an encoding decoding systemUniversity of Malaya (UM)
 
IRJET- Ad-hoc Based Outdoor Positioning System
IRJET- Ad-hoc Based Outdoor Positioning SystemIRJET- Ad-hoc Based Outdoor Positioning System
IRJET- Ad-hoc Based Outdoor Positioning SystemIRJET Journal
 
Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...eSAT Journals
 
Fire Monitoring System for Fire Detection Using ZigBee and GPRS System
Fire Monitoring System for Fire Detection Using ZigBee and GPRS SystemFire Monitoring System for Fire Detection Using ZigBee and GPRS System
Fire Monitoring System for Fire Detection Using ZigBee and GPRS SystemIOSRJECE
 
Optimized mapping and navigation of remote area through an autonomous robot
Optimized mapping and navigation of remote area through an autonomous robotOptimized mapping and navigation of remote area through an autonomous robot
Optimized mapping and navigation of remote area through an autonomous roboteSAT Publishing House
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE IJERA Editor
 
Process monitoring, controlling and load management system in an induction motor
Process monitoring, controlling and load management system in an induction motorProcess monitoring, controlling and load management system in an induction motor
Process monitoring, controlling and load management system in an induction motoreSAT Publishing House
 
IRJET- Intelligent Home Monitoring using IoT for Physically Challenged
IRJET- Intelligent Home Monitoring using IoT for Physically ChallengedIRJET- Intelligent Home Monitoring using IoT for Physically Challenged
IRJET- Intelligent Home Monitoring using IoT for Physically ChallengedIRJET Journal
 
Iaetsd flexible and reconfigurable soc for sensor network under zynq processor
Iaetsd flexible and reconfigurable soc for sensor network under zynq processorIaetsd flexible and reconfigurable soc for sensor network under zynq processor
Iaetsd flexible and reconfigurable soc for sensor network under zynq processorIaetsd Iaetsd
 
Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...
Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...
Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...Mysa Vijay
 
IRJET - Hand Gesture Recognition and Voice Conversion System using IoT
IRJET -  	  Hand Gesture Recognition and Voice Conversion System using IoTIRJET -  	  Hand Gesture Recognition and Voice Conversion System using IoT
IRJET - Hand Gesture Recognition and Voice Conversion System using IoTIRJET Journal
 
Smart Garage Implementation and Design Using Whatsapp Communication Media
Smart Garage Implementation and Design Using Whatsapp Communication MediaSmart Garage Implementation and Design Using Whatsapp Communication Media
Smart Garage Implementation and Design Using Whatsapp Communication MediaTELKOMNIKA JOURNAL
 

What's hot (20)

Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...
 
Logic codes generation and transmission using an encoding decoding system
Logic codes generation and transmission using an encoding decoding systemLogic codes generation and transmission using an encoding decoding system
Logic codes generation and transmission using an encoding decoding system
 
IRJET- Ad-hoc Based Outdoor Positioning System
IRJET- Ad-hoc Based Outdoor Positioning SystemIRJET- Ad-hoc Based Outdoor Positioning System
IRJET- Ad-hoc Based Outdoor Positioning System
 
F224450
F224450F224450
F224450
 
Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...
 
Fire Monitoring System for Fire Detection Using ZigBee and GPRS System
Fire Monitoring System for Fire Detection Using ZigBee and GPRS SystemFire Monitoring System for Fire Detection Using ZigBee and GPRS System
Fire Monitoring System for Fire Detection Using ZigBee and GPRS System
 
Optimized mapping and navigation of remote area through an autonomous robot
Optimized mapping and navigation of remote area through an autonomous robotOptimized mapping and navigation of remote area through an autonomous robot
Optimized mapping and navigation of remote area through an autonomous robot
 
MONITORING FIXTURES OF CNC MACHINE
MONITORING FIXTURES OF CNC MACHINEMONITORING FIXTURES OF CNC MACHINE
MONITORING FIXTURES OF CNC MACHINE
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
EFFICIENT EMBEDDED SURVEILLANCE SYSTEM WITH AUTO IMAGE CAPTURING AND EMAIL SE...
EFFICIENT EMBEDDED SURVEILLANCE SYSTEM WITH AUTO IMAGE CAPTURING AND EMAIL SE...EFFICIENT EMBEDDED SURVEILLANCE SYSTEM WITH AUTO IMAGE CAPTURING AND EMAIL SE...
EFFICIENT EMBEDDED SURVEILLANCE SYSTEM WITH AUTO IMAGE CAPTURING AND EMAIL SE...
 
37 112-1-pb
37 112-1-pb37 112-1-pb
37 112-1-pb
 
40120130405021
4012013040502140120130405021
40120130405021
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE
 
Process monitoring, controlling and load management system in an induction motor
Process monitoring, controlling and load management system in an induction motorProcess monitoring, controlling and load management system in an induction motor
Process monitoring, controlling and load management system in an induction motor
 
IRJET- Intelligent Home Monitoring using IoT for Physically Challenged
IRJET- Intelligent Home Monitoring using IoT for Physically ChallengedIRJET- Intelligent Home Monitoring using IoT for Physically Challenged
IRJET- Intelligent Home Monitoring using IoT for Physically Challenged
 
Iaetsd flexible and reconfigurable soc for sensor network under zynq processor
Iaetsd flexible and reconfigurable soc for sensor network under zynq processorIaetsd flexible and reconfigurable soc for sensor network under zynq processor
Iaetsd flexible and reconfigurable soc for sensor network under zynq processor
 
Ai04606213215
Ai04606213215Ai04606213215
Ai04606213215
 
Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...
Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...
Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...
 
IRJET - Hand Gesture Recognition and Voice Conversion System using IoT
IRJET -  	  Hand Gesture Recognition and Voice Conversion System using IoTIRJET -  	  Hand Gesture Recognition and Voice Conversion System using IoT
IRJET - Hand Gesture Recognition and Voice Conversion System using IoT
 
Smart Garage Implementation and Design Using Whatsapp Communication Media
Smart Garage Implementation and Design Using Whatsapp Communication MediaSmart Garage Implementation and Design Using Whatsapp Communication Media
Smart Garage Implementation and Design Using Whatsapp Communication Media
 

Viewers also liked

Computation of Theoretical Heat of Formation in a Kiln Using Fortran Language
Computation of Theoretical Heat of Formation in a Kiln Using Fortran LanguageComputation of Theoretical Heat of Formation in a Kiln Using Fortran Language
Computation of Theoretical Heat of Formation in a Kiln Using Fortran LanguageIOSR Journals
 
Half-metallic-ferrimagnetic Sr2CrWO6 and Sr2FeReO6 materials for room tempera...
Half-metallic-ferrimagnetic Sr2CrWO6 and Sr2FeReO6 materials for room tempera...Half-metallic-ferrimagnetic Sr2CrWO6 and Sr2FeReO6 materials for room tempera...
Half-metallic-ferrimagnetic Sr2CrWO6 and Sr2FeReO6 materials for room tempera...IOSR Journals
 
Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...
Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...
Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...IOSR Journals
 
Factor analysis as a tool for evaluation of spatial and temporal variations i...
Factor analysis as a tool for evaluation of spatial and temporal variations i...Factor analysis as a tool for evaluation of spatial and temporal variations i...
Factor analysis as a tool for evaluation of spatial and temporal variations i...IOSR Journals
 
Synthesis, Characterization and Antibacterial Activity of New Complexes of So...
Synthesis, Characterization and Antibacterial Activity of New Complexes of So...Synthesis, Characterization and Antibacterial Activity of New Complexes of So...
Synthesis, Characterization and Antibacterial Activity of New Complexes of So...IOSR Journals
 
To Study the Efficacy of Electromyographic Biofeedback Training on Dynamic Eq...
To Study the Efficacy of Electromyographic Biofeedback Training on Dynamic Eq...To Study the Efficacy of Electromyographic Biofeedback Training on Dynamic Eq...
To Study the Efficacy of Electromyographic Biofeedback Training on Dynamic Eq...IOSR Journals
 
Fault Detection Technique for Compact AES Design
Fault Detection Technique for Compact AES DesignFault Detection Technique for Compact AES Design
Fault Detection Technique for Compact AES DesignIOSR Journals
 
Schedulability Analysis for a Combination of Non-Preemptive Strict Periodic T...
Schedulability Analysis for a Combination of Non-Preemptive Strict Periodic T...Schedulability Analysis for a Combination of Non-Preemptive Strict Periodic T...
Schedulability Analysis for a Combination of Non-Preemptive Strict Periodic T...IOSR Journals
 

Viewers also liked (20)

E010513037
E010513037E010513037
E010513037
 
A1102010106
A1102010106A1102010106
A1102010106
 
B0740410
B0740410B0740410
B0740410
 
Computation of Theoretical Heat of Formation in a Kiln Using Fortran Language
Computation of Theoretical Heat of Formation in a Kiln Using Fortran LanguageComputation of Theoretical Heat of Formation in a Kiln Using Fortran Language
Computation of Theoretical Heat of Formation in a Kiln Using Fortran Language
 
I012255862
I012255862I012255862
I012255862
 
A012440104
A012440104A012440104
A012440104
 
L012146369
L012146369L012146369
L012146369
 
Half-metallic-ferrimagnetic Sr2CrWO6 and Sr2FeReO6 materials for room tempera...
Half-metallic-ferrimagnetic Sr2CrWO6 and Sr2FeReO6 materials for room tempera...Half-metallic-ferrimagnetic Sr2CrWO6 and Sr2FeReO6 materials for room tempera...
Half-metallic-ferrimagnetic Sr2CrWO6 and Sr2FeReO6 materials for room tempera...
 
Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...
Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...
Isolation and Purification of Secoisolariciresinoldiglucoside oligomers (Lign...
 
J010616573
J010616573J010616573
J010616573
 
T180203125133
T180203125133T180203125133
T180203125133
 
P13040397103
P13040397103P13040397103
P13040397103
 
A1303060109
A1303060109A1303060109
A1303060109
 
Factor analysis as a tool for evaluation of spatial and temporal variations i...
Factor analysis as a tool for evaluation of spatial and temporal variations i...Factor analysis as a tool for evaluation of spatial and temporal variations i...
Factor analysis as a tool for evaluation of spatial and temporal variations i...
 
J012427496
J012427496J012427496
J012427496
 
Synthesis, Characterization and Antibacterial Activity of New Complexes of So...
Synthesis, Characterization and Antibacterial Activity of New Complexes of So...Synthesis, Characterization and Antibacterial Activity of New Complexes of So...
Synthesis, Characterization and Antibacterial Activity of New Complexes of So...
 
To Study the Efficacy of Electromyographic Biofeedback Training on Dynamic Eq...
To Study the Efficacy of Electromyographic Biofeedback Training on Dynamic Eq...To Study the Efficacy of Electromyographic Biofeedback Training on Dynamic Eq...
To Study the Efficacy of Electromyographic Biofeedback Training on Dynamic Eq...
 
I018135565
I018135565I018135565
I018135565
 
Fault Detection Technique for Compact AES Design
Fault Detection Technique for Compact AES DesignFault Detection Technique for Compact AES Design
Fault Detection Technique for Compact AES Design
 
Schedulability Analysis for a Combination of Non-Preemptive Strict Periodic T...
Schedulability Analysis for a Combination of Non-Preemptive Strict Periodic T...Schedulability Analysis for a Combination of Non-Preemptive Strict Periodic T...
Schedulability Analysis for a Combination of Non-Preemptive Strict Periodic T...
 

Similar to K010117074

Enhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithmEnhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithmAlexander Decker
 
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Editor IJARCET
 
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUEA RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUEcscpconf
 
A research survey rfid security & privacy issue
A research survey rfid security & privacy issueA research survey rfid security & privacy issue
A research survey rfid security & privacy issuecsandit
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsAhmad Sharifi
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...IRJET Journal
 
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...ijcisjournal
 
RFID AND GSM BASED CAMPUS SECURITY SYSTEM
RFID AND GSM BASED CAMPUS SECURITY SYSTEMRFID AND GSM BASED CAMPUS SECURITY SYSTEM
RFID AND GSM BASED CAMPUS SECURITY SYSTEMijiert bestjournal
 
Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Diana Oliva
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodLuz Martinez
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Positive Hack Days
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET Journal
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data MiningIJMER
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...IOSR Journals
 
A gen2 based rfid authentication protocol
A gen2 based rfid authentication protocolA gen2 based rfid authentication protocol
A gen2 based rfid authentication protocolSunil Rm
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmVinayak Raja
 
Review on variants of Security aware AODV
Review on variants of Security aware AODVReview on variants of Security aware AODV
Review on variants of Security aware AODVijsrd.com
 

Similar to K010117074 (20)

Enhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithmEnhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithm
 
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869
 
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUEA RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
 
A research survey rfid security & privacy issue
A research survey rfid security & privacy issueA research survey rfid security & privacy issue
A research survey rfid security & privacy issue
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutions
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
 
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
 
RFID AND GSM BASED CAMPUS SECURITY SYSTEM
RFID AND GSM BASED CAMPUS SECURITY SYSTEMRFID AND GSM BASED CAMPUS SECURITY SYSTEM
RFID AND GSM BASED CAMPUS SECURITY SYSTEM
 
Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data Mining
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 
A gen2 based rfid authentication protocol
A gen2 based rfid authentication protocolA gen2 based rfid authentication protocol
A gen2 based rfid authentication protocol
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
Review on variants of Security aware AODV
Review on variants of Security aware AODVReview on variants of Security aware AODV
Review on variants of Security aware AODV
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

K010117074

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 1, Ver. 1 (Jan - Feb. 2015), PP 70-74 www.iosrjournals.org DOI: 10.9790/2834-10117074 www.iosrjournals.org 70 | Page RSA Algorithm as a Data Security Control Mechanism in RFID Jonathan Sangoro1 Abstract: With Radio Frequency Identification (RFID), new uses of identification and collection of data about tracking of items have been made possible; also, it is understandable that major interest is given to issues of information security and privacy. Lack of assurance regarding data security is one of the remaining obstacles for widespread usage of RFID (A. Juels and R. Pappu, 2004). RFID still can be done without security assurance if individuals do not have to worry about forsaking their privacy. Many issues related to data security and privacy within RFID systems is inherited through using already known technology and methods (Aljifri and Tyrewalla, 2004). However there are many new issues, especially regarding personal data security that need to be resolved and that is why I propose RSA algorithm to mitigate the data security challenges in RFID. Keywords: RFID, Data security and RSA algorithm. I. Introduction Radio Frequency Identification (RFID) has been in use for the last one and a half decades. Currently, RFID systems are usually available in low, high, ultra-high, and microwave frequencies with passive, semi-passive (or semi-active) and active transponders or tags. Tags might be either Chipless, or contain a microchip with read only, or read and write memory. The component controlling communication in a RFID system is called a reader or interrogator, which can be stationary or portable depending on the application. In order for the tags to transmit their data, the tags must be in the reader’s field or interrogation zone, and receive the necessary energy (in form of radio waves) from the reader. Some of the key areas where RFID has been applied is; libraries, publishing, military, hospitals, asset management and livestock tracking. Challenges to RFID technology Although promising, RFID is not without its challenges, which arise from both a technological and usage point of view. Security Security is a key issue in RFID. People who use devices that carry personal information, such as credit card or other ID numbers, do not want others to access their accounts. These are significant security vulnerabilities in RFID and can lead to harm or losses. Privacy Another common concern with RFID is privacy. It is disconcerting for many people to have their movements or buying habits automatically tracked electronically. Many privacy groups are concerned about the ability to identify people as they walk through a store or shopping center via the tags embedded in their clothing and linked to them at the time of purchase. Security Issues in RFID data communication The communications between the components of RFID systems also suffer from security issues. Nevertheless, the level of vulnerability significantly differs from communication between the tag and the reader to communication between the reader and back-end system. Some of the security issues in the communication between the tag and the reader are listed below. 1. Eavesdropping. The communication between reader and tags via the air interface can be monitored by intercepting and decoding the radio signals. This is one of the most common threats to RFID systems. The eavesdropped information could for example be used to collect sensitive information about a person. It could also be used to perform a replay attack. 2. Replay Attack. The attacker can obtain and save all the exchanged messages between a tag and reader and either simulate the tag or the reader towards one another tag to access it’s data.
  • 2. Rsa Algorithm As A Data Security Control Mechanism In Rfid DOI: 10.9790/2834-10117074 www.iosrjournals.org 71 | Page 3. Man-in-the-middle. A man-in-the-middle attack is a form of attack in which the adversary provokes or manipulates the communication between the reader and the tag, where manipulating the communication means relay, withhold, or insert messages. 4. Cloning Attack: The attacker reads the tag’s information and copies it to another tag to impersonate the original tag. The backend server in this case cannot recognize the original tag from the fake one. This attack is typically a physical layer attack and that makes it hard to prevent. Existing Solutions to Data Security Kill Tag By executing a special “kill” command on a tagged product, the RFID tag will be “killed” and can never be reactivated. This “kill” command may disconnect the antenna or short circuit fuse. This ensures that the tag cannot be detected any further, and thus protects the privacy of the individual who possesses the product. But there are instances where a tag may need to be re-activated for examples when a customer returns a previously bought default item back to the store if the item is faulty, what happens then? Faraday cage An RFID tag can be shielded with a container made of metal mesh or foil, known as a “Faraday Cage”. This foil lined container can block radio signals of certain frequencies and thus protect tagged products from being detected. However, this approach might not work in some situations. For example, it is difficult to wrap foil-lined containers around tags used in clothing for pets and people, or the goods in the supermarkets cannot all have their tags wrapped in a faraday cage for obvious reasons, it would be too expensive. Active Jamming Active jamming of RF signals refers to the use of a device that actively broadcasts radio signals in order to disrupt the operation of any nearby RFID readers. This physical means of shielding may disrupt nearby RFID systems. But if the jamming signal is too strong, there is a risk of disruption to all nearby RFID systems. “RSA” Selective Blocker Tag A blocker tag is a passive RFID device that uses a sophisticated algorithm to simulate many ordinary RFID tags simultaneously. It provides an endless series of responses to RFID readers through the use of two antennas to reflect back two bits simultaneously, thereby preventing other tags from being read, performing a kind of passive jamming. However, this approach gives individuals a lot of control. In addition, a blocker tag may be used maliciously to circumvent RFID reader protocols by simulating multiple tag identifiers. RSA Algorithm Introduction Rivest Shamir Aldeman (RSA) algorithm is based on the difficulty of factorizing large numbers that have 2 and only 2 factors which are Prime numbers. The system works on a public and private key system. The public key is made available to everyone. With this key a user can encrypt data but cannot decrypt it, the only person who can decrypt it is the one who possesses the private key. It is theoretically possible but extremely difficult to generate the private key from the public key. This makes the RSA algorithm a very popular choice in data encryption. The Algorithm First of all, two large distinct prime numbers p and q must be generated. The product of these, we call n is a component of the public key. It must be large enough such that the numbers p and q cannot be extracted from it. It must be 512 bits at least i.e. numbers greater than 10154 . We then generate the encryption key e which must be co-prime to the number m =  (n) = (p - 1) (q - 1). We then create the decryption key d such that de mod m = 1. We now have both the public and private keys. Encryption We let y = E(x) be the encryption function where x is an integer and y is the encrypted form of x y = xe mod n Decryption We let X = D(y) be the decryption function where y is an encrypted integer and X is the decrypted form of y
  • 3. Rsa Algorithm As A Data Security Control Mechanism In Rfid DOI: 10.9790/2834-10117074 www.iosrjournals.org 72 | Page X = yd mod n Simple Example a. We start by selecting primes p = 3 and q = 11. b. n = p q = 33 2. m = (p - 1)(q - 1) = (2)(10) = 20. 3. Try e = 3 4. gcd (3; 20) = 1 5. e is co-prime to n 6. Find d such that 1 de mod m 7. 1 = Km + de 8. Using the extended Euclid Algorithm we see that 1 = -1(20) + 7(3) 9. d = 7 10. Now let’s say that we want to encrypt the number x = 9: 11. We use the Encryption function y = xe mod n a. = 93 mod 33 b. = 729 mod 33 3 12. y = 3 13. To decrypt y we use the function X = yd mod n X = 37 mod 33 X = 2187 mod 33  9 X = 9 = x It Works! Example of RSA algorithm Example 1 Let U = 5 and V = 11. This gives R a value of 55, and: Phi (55) = (5 - 1) * (11 - 1) = 4 * 10 = 40. Now, we need to find numbers to fit the equation: P * Q = 1 (mod 40). Let P=7 7 * Q = 1 (mod 40). What would that make Q? If we rewrite this equation to get rid of the unfamiliar modulus arithmetic, we have: 7 * Q = K * 40 + 1, where K can be any number. The first value for Q that works is 23: 7 * 23 = 161 = 4 * 40 + 1. So we have 7 for P, our public key, and 23 for Q, our private key. To make our cipher work, you may recall that the values we use for T must be less than R, and also relatively prime to R. We also don't want to use 1 for T, because 1 raised to any power whatsoever is going to remain 1. Table 1. conversion table 2 3 4 6 7 8 9 12 13 14 16 17 1 A B C D E F G H I J K L M 19 21 23 24 26 27 28 29 31 32 34 36 37 N O P Q R S T U V W X Y Z 38 39 41 42 43 46 47 48 49 51 52 53 Sp 0 1 2 3 4 5 6 7 8 9 * The password we will encrypt is "VENIO" V E N I O 31 7 19 13 21 Table 2. Conversion table To encode it, we simply need to raise each number to the power of P modulo R. V: 31^7 (mod 55) = 27512614111 (mod 55) = 26 E: 7^7 (mod 55) = 823543 (mod 55) = 28 N: 19^7 (mod 55) = 893871739 (mod 55) = 24 I: 13^7 (mod 55) = 62748517 (mod 55) = 7 O: 21^7 (mod 55) = 1801088541 (mod 55) = 21
  • 4. Rsa Algorithm As A Data Security Control Mechanism In Rfid DOI: 10.9790/2834-10117074 www.iosrjournals.org 73 | Page So, our encrypted message is 26, 28, 24, 7, 21 -- or "RTQEO" in our personalized character set. When the message "RTQEO" arrives on the other end of our insecure phone line, we can decrypt it simply by repeating the process -- this time using Q, our private key, in place of P. R: 26^23 (mod 55) = 350257144982200575261531309080576 (mod 55) = 31 T: 28^23 (mod 55) = 1925904380037276068854119113162752 (mod 55) = 7 Q: 24^23 (mod 55) = 55572324035428505185378394701824 (mod 55) = 19 E: 7^23 (mod 55) = 27368747340080916343 (mod 55) = 13 O: 21^23 (mod 55) = 2576580875108218291929075869661 (mod 55) = 21 The result is 31, 7, 19, 13, 21 -- or "VENIO", our original message. Proposed Solution The solution which I propose is an RSA password generated query to improve data security in RFID and ensure that data cannot be accessed by any random reader or attacker that is transmitting radio signal. This also prevents hacking, modification and eavesdropping of data stored in tags by malicious individuals who know that as long as they have readers which transmit radio frequency they can always intercept data or prompt data from tags even if the data stored in those tags is not intended for them. They then use this private data for the own malicious intentions, blackmail or advantage by selling it to the highest competitor. This improvement can be done by adding a script of code to the middleware or software that enables communication or flow or data between the different components that make up and RFID system (tags, readers and database). Finally, this also solves the problem of multiple collision of data from different tags as only the tags with the verified and authenticated password will be allowed to transmit it’s data while the rest of the tags will be locked out. How it works Data security is enhanced by ensuring that the reader and the tag must first have RSA algorithm encoded in the source code. This will ensure that before data transmission occurs, the reader will query the tag to send it’s password, the tag will then send it’s password in ciphertext back to the reader for authentication and verification. The reader then uses the private key in it’s possession to decrypt the ciphertext password back to plaintext and quickly matches it to the password of that particular tag which is stored in the database. If the password is correct then the corresponding requested data by the reader is transmitted in ciphertext form. Once the reader receives this data, it quickly uses the private key in its possession to decode the data ciphertext to plaintext. Data Security requirements shall be incorporated in the reader such that if the tag sends its correct encrypted password (in ciphertext) which is verified and authenticated then data transmission is allowed to proceed from tag to reader and vice-versa, but if the password sent by the tag is wrong , further communication between the tag and reader is blocked forthwith. The advantage is also cemented in the fact that RSA algorithm is based on factorization of two large prime numbers which cannot be easily broken down or determined if one does not have a private key. II. Conclusion And Recommendation While the use of RFID technology is increasing across a range of different industries, the associated security and privacy issues need to be carefully addressed. This paper recommends the use of public key encryption, RSA algorithm in particular is a robust approach to mitigating the data security issues in RFID. This is due to the fact that RSA algorithm is based on use of public and private keys which are used to encrypt data from plaintext to ciphertext and again decrypt the ciphertext back to plaintext. This is the main reason for recommending RSA algorithm as a suitable mechanism for mitigating data security in RFID applications. This is because an attacker who does not possess the correct private key can never decrypt the correct password since the key he/she posses will decrypt the data, yes, but it will be the wrong password and communication terminated henceforth. This is a low cost technique of enhancing data security since no new equipment requires to be bought but only a small script of code is added to the original software to append the RSA algorithm to the code for data security enhancement. References [1]. A.Juels and R. Pappu, (2003), “Squealing euros: Privacy protection in RFID-enabled banknotes”, In proceedings of Financial Cryptography – FC’03, LNCS, volume 2742, Springer-Verlag, pages 103-121. [2]. Tanenbaum, D. Wetherall ”Computer Networks”2011. [3]. AES page available via http://www.nist.gov/CryptoToolkit
  • 5. Rsa Algorithm As A Data Security Control Mechanism In Rfid DOI: 10.9790/2834-10117074 www.iosrjournals.org 74 | Page [4]. Artz, Matthew (2003). City library adopts controversial RFID chips. Retrieved October 10, 2003, from http://www.berkeleydaily.org/article.cfm?issue=10-10-3&storyID=17547 [5]. Auto-ID Center, (2002), “860MHz-960MHz Class I Radio Frequency Identification Tag Radio Frequency & Logical communication Interface Specification Proposed Recommendation Version 1.0.0”, Technical Report MIT-AUTOID-TR-007, November. [6]. Booth-Thomas, Cathy (2003, October 20). The see-it-all chips. Time, 162 (15), 12-17 [7]. Chachra, Vinod (2003). Experiences in implementing RFID solutions in a multi-vendor [8]. environment. IFLA Conference, Berlin, August, 2003. Retrieved August 15, 2003, from [9]. http://www.ifla.org/IV/ifla69/paper/132e-chachra.pdf [10]. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976) [11]. EPC Radio-Frequency Identity Protocols Generation 2 Identity Tag (Class 1):Protocol for Communications at 860 MHz-960 MHz. EPC Global Hardware Action Group (HAG), EPC Identity Tag (Class 1) Generation 2, Last-call Working Draft Version 1.0.2, 2003-11-24. [12]. FIPS 180-2. Secure Hash Standard, http://csrc.nist.gov/publications/, 2002 [13]. H. Aljifri, and N. Tyrewalla, (2004), “Security model for Intra-Domain Mobility Management Protocol”, Int. J. of Mobile Communications, Vol. 2, No.2, pp. 157 – 170. [14]. Hecht, Jeff (2004). Casino chips to carry RFID tags. New Scientist. Retrieved September 02, 2004, from http://www.newscientist.com/news/news.jsp?id=ns99994542 [15]. Holmström, J., Ketokivi, K., Hameri, A.-P. (2009b), “Bridging Practice and Theory: A Design Science Approach”, Decision Sciences, Vol. 40 No. 1, pp. 65-87. [16]. Juels, A., Weis, S.A. (2005). Authenticating Pervasive Devices with Human Protocols. [17]. Advances in Cryptology – Crypto ’05. Lecture Notes in Computer Science. Volume 3621. Pages 293-308. [18]. W. Küchlin, “Public key encryption,” ACM SIGSAM Bulletin, August 1987, pp. 69-73.