Primitive Operations
Communication Operations –Reader to tag Read Write –Tag to Tag Read Write Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256, Sha-512 –Encryption: Symmetric: AES, DES Asymmetric: RSA Two Types of Operations
An example of RFID security protocol –A challenge-response protocol Pass 1: the reader sends a challenge C Pass 2: the tag returns a response F(C, key) Reader RFID tag Challenge C Response F(C, key) Reader to tag: Write Reader to tag: Read Tag to tag: Read Tag to tag: Write Hash or encryption: F(*) An Example
An example of RFID security protocol –A challenge-response protocol RFID tag Tag to tag: ReadTag to tag: Write F(x, y) C………Key F(C, Key) A hash or encryption A memory bank Tag to Tag Operations
Time Requirements Tag to Tag Operations –Read: ms, Write: ms, one word Reader to Tag Operations –Read: 47 ms one word, 57 ms 15 words, 0.5 ms +1 word
Time Requirements Tag to Tag Operations –Read: ms, Write: ms, one word Reader to Tag Operations –Read: 47 ms one word, 57 ms 15 words, 0.5 ms +1 word –Write: 63 ms one word, increment: 20 ms / word
Time Requirements Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256, Sha-512 Block size (bytes): one blockn blocks MD5: n Sha-1: n Sha-256: n Sha-512: n
Time Requirements Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256, Sha-512 MD5: 1.8 ms one block, 3.2 ms two blocks
Time Requirements Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256, Sha-512 Sha-1: 5.0ms / block
Time Requirements Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256, Sha-512 Sha-256: 11.6ms / block
Time Requirements Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256, Sha-512 Sha-512: 41.0ms / block