Public Key Cryptography and RFID Tags

  • M. McLoone
  • M. J. B. Robshaw
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4377)


When exploring solutions to some of the formidable security problems facing RFID deployment, researchers are often willing to countenance the use of a strong symmetric primitive such as the AES. At the same time it is often claimed that public key cryptography cannot be deployed on low-cost tags. In this paper we give a detailed analysis of the GPS identification scheme. We show that with regards to all three attributes of space, power, and computation time, the on-tag demands of GPS identification compare favourably to the landmark AES implementation by Feldhofer et al.. Thus, assumed limits to implementing asymmetric cryptography on low-end devices may need to be re-evaluated.


Clock Cycle Security Level Stream Cipher Gate Equivalent Asymmetric Cryptography 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Avoine, G.: Cryptography in Radio Frequency Identification and Fair Exchange Protocols. Ph.D. thesis (December 2005), Available via:
  2. 2.
    Calmels, B., Canard, S., Girault, M., Sibert, H.: Low-cost Cryptography for Privacy in RFID Systems. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol. 3928, pp. 237–251. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  3. 3.
    Coron, J.S., Lefranc, D., Poupard, G.: A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 47–60. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  4. 4.
    EPCglobal Inc. Home Page, Available via:
  5. 5.
    eSTREAM Project, Available via:
  6. 6.
    Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems Using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357–370. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  7. 7.
    Girault, M.: Self-certified Public Keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490–497. Springer, Heidelberg (1991)Google Scholar
  8. 8.
    Girault, M.: Low-size Coupons for Low-cost IC Cards. In: Domingo-Ferrer, J., Chan, D., Watson, A. (eds.) Proceedings of Cardis 2000, IFIP Conference Proceedings, vol. 180, pp. 39–50. Kluwer Academic Publishers, Dordrecht (2000)Google Scholar
  9. 9.
    Girault, M., Lefranc, D.: Public Key Authentication With One (On-line) Single Addition. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 413–427. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Girault, M., Stern, J.: On the Length of Cryptographic Hash-values Used in Identification Schemes. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 202–215. Springer, Heidelberg (1994)Google Scholar
  11. 11.
    Good, T., Chelton, W., Benaissa, M.: Review of Stream Cipher Candidates From a Low Resource Hardware Perspective, Available via:
  12. 12.
    ISO/IEC. International Standard ISO/IEC 9798 Part 5: Mechanisms Using Zero-knowledge Techniques (December 2004)Google Scholar
  13. 13.
    IST-1999-12324. Final Report of European Project IST-1999-12324: New European Schemes for Signatures, Integrity, and Encryption (NESSIE), Available via:
  14. 14.
    Juels, A., Weis, S.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293–308. Springer, Heidelberg (2005)Google Scholar
  15. 15.
    Menezes, A., van Oorschot, P.C., Vanstone, S.: The Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)CrossRefGoogle Scholar
  16. 16.
    Moore, G.E.: Cramming More Components Onto Integrated Circuits. Electronics (April 19, 1965), Available via:
  17. 17.
    National Institute of Standards and Technology. FIPS 197: Advanced Encryption Standard, Available via:
  18. 18.
    Parhami, B.: Computer Arithmetic: Algorithms and Hardware Designs. Oxford University Press, Oxford (2000)Google Scholar
  19. 19.
    Poupard, G., Stern, J.: Secuity Analysis of a Practical “On the Fly” Authentication and Signature Generation. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 422–436. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  20. 20.
    Weis, S.: Security and Privacy in Radio-Frequency Identification Devices. M.Sc. Thesis (May 2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • M. McLoone
    • 1
  • M. J. B. Robshaw
    • 2
  1. 1.Institute of Electronics, Communications, and Information TechnologyQueen’s UniversityBelfastU.K.
  2. 2.France Telecom Research and DevelopmentIssy les Moulineaux, Cedex 9France

Personalised recommendations