Strong Crypto for RFID Tags - A Comparison of Low-Power Hardware Implementations
- 1 May 2007
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 02714302,p. 1839-1842
- https://doi.org/10.1109/iscas.2007.378272
Abstract
The implementation of security protocols in RFID systems is challenging because of the fierce constraints concerning power consumption and low die size of RFID tags. The choice of the appropriate cryptographic primitive is difficult because there are many different algorithms available and the design options for each are manifold. In this paper, we analyze the standardized cryptographic algorithms SHA-256, SHA-1, MD5, AES-128, and ECC-192 in terms of implementation efficiency. The three parameters mean power consumption, chip area, and the number of clock cycles, are used to introduce a metric for a fair comparison of different hardware implementations. We describe the implementations of the five modules which were optimized for application in passive RFID tags and compare their results. We give conclusive evidence that the use of AES in RFID systems is most appropriate todayKeywords
This publication has 5 references indexed in Scilit:
- A Lightweight RFID Protocol to protect against Traceability and Cloning attacksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- RFID security and privacy: a research surveyIEEE Journal on Selected Areas in Communications, 2006
- Efficient RFID Authentication Protocol for Ubiquitous Computing EnvironmentLecture Notes in Computer Science, 2005
- AES implementation on a grain of sandIEE Proceedings - Information Security, 2005
- Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiersPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004