The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
RFID (radio frequency identification) is an efficient automatic identification technology used in a wide variety of applications and more recently as a leading authentication technology in many security services. However, the wireless nature of the transmitted data causes various security issues that must be addressed decisively. To solve these issues, numerous solutions and attempts have been proposed...
Pseudo-random numbers generators (PRNG) are one of the main security tools in Radio Frequency IDentification (RFID) technology. Thus, a weak internal embedded generator can directly cause the entire application to be insecure and it makes no sense to employ robust protocols for the security issue. In this paper, we propose a new PRNG constructed by randomly selecting points from two elliptic curves,...
In this paper, the implementation of passive UHF RFID, using Agilent Advanced Design System, is constructed. The implementation of this system is divided into two main parts, the reader part and the tag part. The architecture of each part is described in details and is implemented. During the design process, we propose models for building blocks of different encoding types used in RFID system. A dipole...
In this paper, we provide an investigation on the feasibility of embedding the ECC authentication service in RFID chip-set. Thus, we deal with the implementation of the most costly operation, which is the scalar point multiplication. It is also considered as the core of the security of the ECC protocols. Two architectures are studied and implemented using the Montgomery algorithm adopting the affine...
In this paper, we propose a new RFID authentication protocol based on elliptic curves ElGamal encryption schemes. The proposed protocol needs two passes, requires only scalar point multiplications operation and can resist to various kinds of attacks such as man-in-the-middle attack, simple power analysis, and replay attacks.These features make it very attractive to low cost RFID applications, such...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.