Hash Functions and RFID Tags: Mind the Gap
- Cite this paper as:
- Bogdanov A., Leander G., Paar C., Poschmann A., Robshaw M.J.B., Seurin Y. (2008) Hash Functions and RFID Tags: Mind the Gap. In: Oswald E., Rohatgi P. (eds) Cryptographic Hardware and Embedded Systems – CHES 2008. CHES 2008. Lecture Notes in Computer Science, vol 5154. Springer, Berlin, Heidelberg
The security challenges posed by RFID-tag deployments are well-known. In response there is a rich literature on new cryptographic protocols and an on-tag hash function is often assumed by protocol designers. Yet cheap tags pose severe implementation challenges and it is far from clear that a suitable hash function even exists. In this paper we consider the options available, including constructions based around compact block ciphers. While we describe the most compact hash functions available today, our work serves to highlight the difficulties in designing lightweight hash functions and (echoing ) we urge caution when routinely appealing to a hash function in an RFID-tag protocol.