[Resource Topic] 2011/381: A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem

Welcome to the resource topic for 2011/381

Title:
A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem

Authors: Yalin Chen, Jue-Sam Chou, Chi-Fong Lin, Cheng-Lun Wu

Abstract:

Recently, many researchers have proposed RFID authentication protocols. These protocols are mainly consists of two types: symmetric key based and asymmetric key based. The symmetric key based systems usually have some weaknesses such as suffering brute force, de-synchronization, impersonation, and tracing attacks. In addition, the asymmetric key based systems usually suffer from impersonation, man-in-the-middle, physical, and tracing attacks. To get rid of those weaknesses and reduce the system workload, we adopt elliptic curve cryptosystem (ECC) to construct an asymmetric key based RFID authentication system. Our scheme needs only two passes and can resist various kinds of attacks. It not only outperforms the other RFID schemes having the same security level but also is the most efficient.

ePrint: https://eprint.iacr.org/2011/381

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .