Elliptic curve cryptography based authentication protocol for small computational capacity RFID systems

In the last few years RFID technology widespread. This technology can be found in each field of our daily life, e.g. supply-chain management, libraries, access management etc. For the sake of small computational capacity of RFID Tags, at first, only mathematical and logical operations and lightweight authentication methods can be used. However, thanks to the evolution of RFID technology, nowadays PKI infrastructure is also usable in this environment. In this paper we present our elliptic curve cryptography based authentication protocol which protects against the well-known attacks. We give a brief comparison with other EC based protocols in the security point of view.

[1]  Tassos Dimitriou,et al.  A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[2]  KyungOh Lee,et al.  An Advanced Mutual-Authentication Algorithm Using AES for RFID Systems , 2006 .

[3]  Sheikh Iqbal Ahamed,et al.  ERAP: ECC Based RFID Authentication Protocol , 2008, 2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems.

[4]  Tim Kerins,et al.  Public-Key Cryptography for RFID-Tags , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[5]  Máire O'Neill,et al.  Public Key Cryptography and RFID Tags , 2007, CT-RSA.

[6]  Gene Tsudik,et al.  YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[7]  Magyar Tud Mutual Authentication Protocol for Low Computational Capacity RFID Systems , 2008 .

[8]  Jacques Stern,et al.  Security Analysis of a Practical "on the fly" Authentication and Signature Generation , 1998, EUROCRYPT.

[9]  Sándor Imre,et al.  Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems - performance analysis by simulations , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[10]  Marc Girault,et al.  Self-Certified Public Keys , 1991, EUROCRYPT.

[11]  Christof Paar,et al.  Lightweight Cryptography and RFID: Tackling the Hidden Overhead , 2009, KSII Trans. Internet Inf. Syst..

[12]  Erwin Hess,et al.  Using Elliptic Curves on RFID Tags , 2008 .

[13]  M. Girault,et al.  The Feasibility of Onthe-Tag Public Key Cryptography , 2007 .

[14]  Marc Joye,et al.  The Montgomery Powering Ladder , 2002, CHES.

[15]  Sándor Imre,et al.  Performance analysis of the simple lightweight authentication protocol , 2009, MoMM.