Global Sales Contact List

Contact   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

RSA Laboratories

Minimalist Cryptography for RFID Tags

A. Juels

Citation: A. Juels. Minimalist Cryptography for RFID Tags. In C. Blundo, ed., Security of Communication Networks (SCN), pp.149—164. 2004

Abstract: Cryptography offers an abundance of tools for protecting privacy and enforcing strong authentication. Basic RFID tags, however, are not presently believed to have enough computational power to perform even the most rudimentary cryptographic algorithms. RSA Laboratories has elaborated a framework for "minimalist cryptography" in RFID tags -- that is, achievement of the goals of cryptography under the special constraints posed by RFID.

One of the key ideas in this work is the application of pseudonyms to help enforce privacy in RFID tags. In a nutshell, a tag may carry multiple, random-looking names. Each time it is queried, the tag releases a different name. In principal, then only a valid verifier can tell when two different names belong to the same tag. Of course, an adversary could query a tag multiple times to harvest all names so as to defeat the scheme. The approach described here involves some special enhancements to help prevent this. First, tags release their names only at a certain (suitably slow) prescribed rate. Second, pseudonyms can be refreshed by authorized readers.

Click here for paper

Full Publication List

Notes:
Connect with EMCConnect with EMC
Need help immediately? EMC Sales Specialists are standing by to answer your questions real time.
Use Live Chat for fast, direct access to EMC Customer Service Professionals to resolve your support questions.
Explore and compare EMC products in the EMC Store, and get a price quote from EMC or an EMC partner.
We're here to help. Send us your sales inquiry and an EMC Sales Specialist will get back to you within one business day.
Want to talk? Call us to speak with an EMC Sales Specialist live.