A low-cost UHF RFID tag chip with AES cryptography engine

In this paper, the design of a low-cost ultra-high-frequency UHF Radio Frequency IDentification RFID tag chip with an advanced encryption standard AES cryptographic engine is presented. The design of digital baseband is verified on a Field-Programmable Gate Array FPGA platform. The whole chip, including a radio frequency frontend, an analog frontend, an Electrically Erasable Programmable Read-Only Memory EEPROM, and a baseband with AES engine, is taped out on Semiconductor Manufacturing International Corporation SMIC 0.13µm process. The chip area is 1×1 mm2, in which 0.6×0.3 mm2 is covered by the digital baseband. The power consumption of the entire tag chip is 20.9 µW. The design can work on both two modes of the standard ISO 18000-6C mode and the security enhanced ISO 18000-6C mode. To the best of our knowledge, it is the first UHF passive RFID tag chip with AES algorithm in the baseband.

[1]  Duong Huynh Thai Vo,et al.  A Fully Integrated HF-Band Passive RFID Tag IC Using 0.18- $\mu\hbox{m}$ CMOS Technology for Low-Cost Security Applications , 2011, IEEE Transactions on Industrial Electronics.

[2]  G. Gong,et al.  Ultra-Lightweight Cryptography for Low-Cost RFID Tags : Hummingbird Algorithm and Protocol , 2009 .

[3]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[4]  Li Yin,et al.  The design of an RFID security protocol based on RSA signature for e-ticket , 2010, 2010 2nd IEEE International Conference on Information Management and Engineering.

[5]  Seok-Cheon Park,et al.  A Lightweight ECC Algorithm for Mobile RFID Service , 2010, 2010 Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications.

[6]  Tim Good,et al.  A low-frequency RFID to challenge security and privacy concerns , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[7]  Flavio D. Garcia,et al.  A Practical Attack on the MIFARE Classic , 2008, CARDIS.

[8]  Hyunwoo Kang,et al.  A Lightweight RFID Authentication Protocol Using Step by Step Symmetric Key Change , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[9]  Mikko Lehtonen,et al.  From Identification to Authentication – A Review of RFID Product Authentication Techniques , 2008 .

[10]  Paul Müller,et al.  Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[11]  Xing Zhang,et al.  An UHF RFID transponder with novel demodulator and security algorithm , 2009, 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication.

[12]  Irfan Syamsuddin,et al.  A Survey of RFID Authentication Protocols Based on Hash-Chain Method , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[13]  Nicolas Courtois,et al.  Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards , 2008, IACR Cryptol. ePrint Arch..

[14]  Hongnian Yu,et al.  A RFID mutual authentication protocol based on AES algorithm , 2012, Proceedings of 2012 UKACC International Conference on Control.

[15]  O.T.-C. Chen,et al.  Passive RFID transponder with power-aware encryption , 2008, 2008 51st Midwest Symposium on Circuits and Systems.

[16]  Norbert Giczi,et al.  Elliptic curve cryptography based mutual authentication protocol for low computational complexity environment , 2010, IEEE 5th International Symposium on Wireless Pervasive Computing 2010.

[17]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[18]  H.C. Luong,et al.  Low Power VLSI Design for a RFID Passive Tag baseband System Enhanced with an AES Cryptography Engine , 2007, 2007 1st Annual RFID Eurasia.

[19]  Elisabeth Oswald,et al.  An ASIC Implementation of the AES SBoxes , 2002, CT-RSA.

[20]  David Evans,et al.  Reverse-Engineering a Cryptographic RFID Tag , 2008, USENIX Security Symposium.

[21]  Chih-Tsun Huang,et al.  A High-Throughput Low-Power AES Cipher for Network Applications , 2007, 2007 Asia and South Pacific Design Automation Conference.

[22]  Panu Hämäläinen,et al.  Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core , 2006, 9th EUROMICRO Conference on Digital System Design (DSD'06).

[23]  Ilaria De Munari,et al.  Design of an Ultra Low-Power RFID Baseband Processor Featuring an AES Cryptography Engine , 2008, 2008 11th EUROMICRO Conference on Digital System Design Architectures, Methods and Tools.

[24]  Feng Xiaoxing,et al.  Design and implementation of a security-enhanced baseband system for UHF RFID tag , 2009, 2009 IEEE 8th International Conference on ASIC.

[25]  Hung-Min Sun,et al.  A Gen2-Based RFID Authentication Protocol for Security and Privacy , 2009, IEEE Transactions on Mobile Computing.

[26]  Kwangjo Kim,et al.  Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .

[27]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.