RFID (radio frequency identification) systems tend to be one of the most predominant computing technologies due to their low cost and their broad applicability. Latest technologies have brought costs down, and standards are being developed. Now the RFID technology is very important and essential. It is used for innovative applications in personnel services. RFID technology is based on tags, distance and frequency, communication mode, antenna and power transfer, and communication. The attacks are based on the way the RFID systems are communicating and the way that are transferred between the entities of an RFID network (tags, readers). Securing information exchange between readers and tags needs some cryptography methods like symmetric (affine method, block stream method, etc.) or asymmetric (RSA, ECC, etc.) key methods. In this chapter, the authors compare methods based on complexity and power. Then they choose the best for securing communication between RFID tags and RFID readers.
[1]
Martin Hell,et al.
Grain: a stream cipher for constrained environments
,
2007,
Int. J. Wirel. Mob. Comput..
[2]
Martin Hell,et al.
Grain-128a: a new version of Grain-128 with optional authentication
,
2011,
Int. J. Wirel. Mob. Comput..
[3]
Benabdellah Mohammed,et al.
Crypto-Compression of Images Based on The ANNs and The AES Algorithm
,
2011
.
[4]
Vincent Rijmen,et al.
AES implementation on a grain of sand
,
2005
.
[5]
Christophe De Cannière,et al.
Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
,
2006,
ISC.
[6]
Yun Tian,et al.
On the Design of Trivium
,
2009,
IACR Cryptol. ePrint Arch..
[7]
Vincent Rijmen,et al.
The Design of Rijndael
,
2002,
Information Security and Cryptography.
[8]
Noureddine Zahid,et al.
Encryption-Compression of Images Based on FMT and AES Algorithm
,
2007
.