TY - GEN
T1 - A low-resource public-key identification scheme for RFID tags and sensor nodes
AU - Oren, Yossef
AU - Feldhofer, Martin
PY - 2009/9/21
Y1 - 2009/9/21
N2 - We revisit a public key scheme presented by Shamir in [19] (and simultaneously by Naccache in [15]) and examine its applicability for general-purpose RFID tags in the supply chain. Using a combination of new and established space-saving methods, we present a full-fledged public key identification scheme, which is secure yet highly efficient. The 1024-bit scheme fits completely (including RAM) into 4682 gate equivalents and has a mean current consumption of 14.2 μA. The main novelty in our implementation is the replacement of the long pseudo-random sequence, originally stored on 260 bytes of EEPROM in [19], by a reversible stream cipher using less than 300 bits of RAM. We show how our scheme offers tag-to-reader and reader-to-tag authentication and how it can be fit into the existing RFID supply chain infrastructure.
AB - We revisit a public key scheme presented by Shamir in [19] (and simultaneously by Naccache in [15]) and examine its applicability for general-purpose RFID tags in the supply chain. Using a combination of new and established space-saving methods, we present a full-fledged public key identification scheme, which is secure yet highly efficient. The 1024-bit scheme fits completely (including RAM) into 4682 gate equivalents and has a mean current consumption of 14.2 μA. The main novelty in our implementation is the replacement of the long pseudo-random sequence, originally stored on 260 bytes of EEPROM in [19], by a reversible stream cipher using less than 300 bits of RAM. We show how our scheme offers tag-to-reader and reader-to-tag authentication and how it can be fit into the existing RFID supply chain infrastructure.
KW - Hardware implementation
KW - Public-key encryption
KW - RFID technology
KW - Rabin encryption
UR - http://www.scopus.com/inward/record.url?scp=70349087741&partnerID=8YFLogxK
U2 - 10.1145/1514274.1514283
DO - 10.1145/1514274.1514283
M3 - Conference contribution
AN - SCOPUS:70349087741
SN - 9781605584607
T3 - Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09
SP - 59
EP - 68
BT - Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09
T2 - 2nd ACM Conference on Wireless Network Security, WiSec'09
Y2 - 16 March 2009 through 18 March 2009
ER -