Abstract
Radio Frequency Identification (RFID) systems can be found in wide spread applications – from simple theft prevention over multi bit transponders up to complex applications involving contactless smartcards. This paper shows that the security gap between low-cost RFID Tags that only provide simple security features and contactless smartcards can be filled. It is examined how much energy a passive tag can gain from a magnetic field and which amount is needed by basic logic functions. The gate-equivalents of several cryptographic operations are then compared with the available energy and a conclusion is drawn if they are feasible for RFID tags.
Chapter PDF
Similar content being viewed by others
Keywords
- Power Constraint
- Radio Frequency Identification
- Elliptic Curve Cryptography
- Average Power Consumption
- Cryptographic Algorithm
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Sarma, S.E., Weis, S.A., Engels, D.W.: RFID Systems and Security and Privacy Implications. In: Cryptographic Hardware and Embedded Systems - CHES (2002)
Fong, K.: RFID Security, http://www.cs.siu.edu/~kfong/research/RFID.ppt
MIT Auto-ID Center, http://www.autoidcenter.org
CASPIAN, http://www.nocards.org
Auto-id Center. Draft protocol specification for a 900 MHz class 0 Radio Frequency Identification Tag, Feburary 23 (2003)
Infineon technologies. SLE 66CLX641P Short Product Information (April 2004)
Finkenzeller, K.: RFID-Handbuch. Hanser Verlag (2002)
ISO/IEC 14443. Identification cards – Contactless integrated circuit(s) cards – Proximity cards – Part 2: Radio frequency power and signal interface (July 2001)
Lehner, G.: Elektomagnetische Feldtheorie für Ingenieure und Physiker. Springer, Heidelberg (1990)
Smythe, W.R.: Static and Dynamic Electricity. McGraw-Hill Book Company, New York (1968)
MOSIS, http://www.mosis.org
ASICSws, http://www.asics.ws
Krasner, J.: Using Elliptic Curve Cryptography (ECC) for Enhanced Embedded Security (November 2004)
Baker, R.J., Li, H.W., Boyce, D.E.: CMOS Circuit Design, Layout, And Simulation. IEEE Press, Los Alamitos (1998)
MATLAB, http://www.mathworks.com
WinSpice, http://www.winspice.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 IFIP International Federation for Information Processing
About this paper
Cite this paper
Lohmann, T., Schneider, M., Ruland, C. (2006). Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds) Smart Card Research and Advanced Applications. CARDIS 2006. Lecture Notes in Computer Science, vol 3928. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11733447_20
Download citation
DOI: https://doi.org/10.1007/11733447_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33311-1
Online ISBN: 978-3-540-33312-8
eBook Packages: Computer ScienceComputer Science (R0)