Advertisement

Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags

  • Tobias Lohmann
  • Matthias Schneider
  • Christoph Ruland
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3928)

Abstract

Radio Frequency Identification (RFID) systems can be found in wide spread applications – from simple theft prevention over multi bit transponders up to complex applications involving contactless smartcards. This paper shows that the security gap between low-cost RFID Tags that only provide simple security features and contactless smartcards can be filled. It is examined how much energy a passive tag can gain from a magnetic field and which amount is needed by basic logic functions. The gate-equivalents of several cryptographic operations are then compared with the available energy and a conclusion is drawn if they are feasible for RFID tags.

Keywords

Power Constraint Radio Frequency Identification Elliptic Curve Cryptography Average Power Consumption Cryptographic Algorithm 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Sarma, S.E., Weis, S.A., Engels, D.W.: RFID Systems and Security and Privacy Implications. In: Cryptographic Hardware and Embedded Systems - CHES (2002)Google Scholar
  2. 2.
  3. 3.
    MIT Auto-ID Center, http://www.autoidcenter.org
  4. 4.
  5. 5.
    Auto-id Center. Draft protocol specification for a 900 MHz class 0 Radio Frequency Identification Tag, Feburary 23 (2003)Google Scholar
  6. 6.
    Infineon technologies. SLE 66CLX641P Short Product Information (April 2004)Google Scholar
  7. 7.
    Finkenzeller, K.: RFID-Handbuch. Hanser Verlag (2002)Google Scholar
  8. 8.
    ISO/IEC 14443. Identification cards – Contactless integrated circuit(s) cards – Proximity cards – Part 2: Radio frequency power and signal interface (July 2001)Google Scholar
  9. 9.
    Lehner, G.: Elektomagnetische Feldtheorie für Ingenieure und Physiker. Springer, Heidelberg (1990)CrossRefGoogle Scholar
  10. 10.
    Smythe, W.R.: Static and Dynamic Electricity. McGraw-Hill Book Company, New York (1968)MATHGoogle Scholar
  11. 11.
  12. 12.
  13. 13.
    Krasner, J.: Using Elliptic Curve Cryptography (ECC) for Enhanced Embedded Security (November 2004)Google Scholar
  14. 14.
    Baker, R.J., Li, H.W., Boyce, D.E.: CMOS Circuit Design, Layout, And Simulation. IEEE Press, Los Alamitos (1998)Google Scholar
  15. 15.
  16. 16.

Copyright information

© IFIP International Federation for Information Processing 2006

Authors and Affiliations

  • Tobias Lohmann
    • 1
  • Matthias Schneider
    • 1
  • Christoph Ruland
    • 1
  1. 1.Institute for Data Communication SystemsUniversity of SiegenSiegenGermany

Personalised recommendations