Maximalist Cryptography and Computation on the WISP UHF RFID Tag

With continuous improvements in the ef?ciency of microelectronics, it is now possible to power a general-purpose microcontroller wirelessly at a reasonable range. Our implementation of RC5-32/18/16 on the WISP UHF RFID tag shows that conventional cryptography is no longer beyond the reach of a general-purpose UHF tag. In this paper, (1) we provide preliminary experimental data on how much computation is available on a TI MSP430F2132 microcontroller-based RFID tag containing approximately 8 KBytes of ?ash and 512 bytes of RAM, and (2) we show that symmetric cryptography is feasible on an RF-powered, general-purpose RFID tag — providing the ?rst implementation of conventional cryptography on an RF-powered UHF RFID tag as far as we are aware

[1]  P. Israsena Securing ubiquitous and low-cost RFID using tiny encryption algorithm , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[2]  Andrew S. Tanenbaum,et al.  A Platform for RFID Security and Privacy Administration (Awarded Best Paper!) , 2006, LISA.

[3]  Kevin Fu,et al.  Cryptanalysis of Two Lightweight RFID Authentication Schemes , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[4]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[5]  Selwyn Piramuthu,et al.  HB and Related Lightweight Authentication Protocols for Secure RFID Tag/Reader Authentication , 2006 .

[6]  Joshua R. Smith,et al.  Design of a Passively-Powered, Programmable Sensing Platform for UHF RFID Systems , 2007, 2007 IEEE International Conference on RFID.

[7]  Daesung Kwon,et al.  Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005 , 2006, EUC Workshops.

[8]  Tieyan Li,et al.  Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols , 2007, SEC.

[9]  Sébastien Canard,et al.  Low-Cost Cryptography for Privacy in RFID Systems , 2006, CARDIS.

[10]  Juan E. Tapiador,et al.  EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.

[11]  Fan Zhang,et al.  A 9.2µA gen 2 compatible UHF RFID sensing tag with −12dBm Sensitivity and 1.25µVrms input-referred noise floor , 2010, 2010 IEEE International Solid-State Circuits Conference - (ISSCC).

[12]  Alanson P. Sample,et al.  A Wirelessly-Powered Platform for Sensing and Computation , 2006, UbiComp.

[13]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[14]  Kazukuni Kobara,et al.  Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[15]  M. Aigner Secure Symmetric Authentication for RFID Tags , 2005 .

[16]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[17]  Juan E. Tapiador,et al.  M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, UIC.

[18]  Pedro Peris-López,et al.  LMAP : A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags , 2006 .

[19]  Ari Juels,et al.  Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.

[20]  Damith C. Ranasinghe,et al.  A Low Cost Solution to Authentication in Passive RFID Systems , 2006, ASILOMAR 2006.

[21]  Kevin Fu,et al.  CCCP: Secure Remote Storage for Computational RFIDs , 2009, USENIX Security Symposium.

[22]  Kevin Fu,et al.  Getting Things Done on Computational RFIDs with Energy-Aware Checkpointing and Voltage-Aware Scheduling , 2008, HotPower.