Skip to main content

A Random Number Generator for Application in RFID Tags

  • Chapter
Networked RFID Systems and Lightweight Cryptography

Abstract

With the extensive use of RFID systems, the problem of information security becomes more and more critical. Cryptography can offer private communications between the RFID reader and tag by using elaborately generated cryptographic keys. These unpredictable and irreproducible secret keys determine the communication security, and they are normally created by a nondeterministic random number generator (RNG) [1]. In current RFID technologies, pseudo random number generators (PRNG) serve as random number sources. Owing to the mechanism of PRNGs, their output numbers show poor randomicity. These less random secret keys, with no doubt, reduce the security of data transmission. An oscillator-based Truly Random Number Generator application scheme in [2] provides a better solution. The TRNG exploits thermal noise of two resistors to modulate the edge of a sampling clock. The white noise based cryptographic keys prevent potential attackers to perform any effective prediction about the generator’s output even if the design is well-known. A major topic of this paper is to discuss how to realize a TRNG in the RFID tag system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schneier, B.: Applied Cryptography. JWiley, New York (1994) 1

    Google Scholar 

  2. Bucci, M., et al.: A High-speed oscillator-based truly random number source for cryptographic applications on a smart card IC. In IEEE Transactions on Computers, Vol. 52, No. 4, pp.403–409, 2003

    Article  Google Scholar 

  3. Craig S.P., Connelly, J.A.: A noise-based IC random number generator for applications in cryptography. In: IEEE Transactions on Circuits and Systems, Vol. 47, No.5, (2000)

    Google Scholar 

  4. Craig S.P., Connelly, J.A.: Modeling and simulation of oscillator-based random number generators. In: IEEE Proceedings of ISCAS (1996) 4:324–327

    Google Scholar 

  5. Craig S.P., Connelly, J.A.: The sampling of noise for random number generation. In: IEEE Proceedings of ISCAS (1999) 6:26–29

    Google Scholar 

  6. Boni, A.: Op-Amps and startup circuits for CMOS band gap references with near 1-V supply. In: IEEE Journal of Solid-State Circuits, Vol. 37, No. 10 (2002)

    Google Scholar 

  7. Adalan, B., et al.: Low voltage low power operational amplifiers. In: IEEE proceedings of ICECS (2003) 822–825

    Google Scholar 

  8. Jun, B., Kocher, P.: The Intel random number generator. In: Cryptographic Research Inc., White Paper Prepared for Intel Corp. (1999). Available from: http://www.cryptography.com/resources/whitepapers/IntelRNG.pdf

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Che, W., Deng, H., Tan, W., Wang, J. (2008). A Random Number Generator for Application in RFID Tags. In: Cole, P., Ranasinghe, D. (eds) Networked RFID Systems and Lightweight Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71641-9_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71641-9_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71640-2

  • Online ISBN: 978-3-540-71641-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics