RFID Paper presentation The Security of EPC Gen2 Compliant RFID Protocols Source : Applied Cryptography and Network Security, VOL. 5037, 2008, pp Authors :Mike Burmester, Breno De Medeiros Speaker : Chia- Hung Chang Date : A Practical Approach for Enhancing Security of EPC global RFID Gen2 Tag Source : Future Generation Communication and Networking, VOL. 1, NO. 5, Dec 2007, pp Authors :Jaemin Park
Outline Introduction Relate Work Proposed Scheme Security analysis Conclusion & Future Work 2
Introduction(1/2) 3 Sever Tag Reader (3)Authenticate (1)Request (2)Response (4) Forward phase
Introduction(2/2) Tag in C1Gen2 only can use Pseudo-random number generator(PRNG) - 16 bits Cyclic Redundancy Code(CRC) - 16 bits 4
Protocol notations 5 Tag Reader Tag issuing system Backend sever with DB RFID code (eg. EPC) PC bits Access password Kill password Random numbers
6 Relate Work - Duc-Park-Lee-Kim RFID Protocol [10](1/2)
7 Relate Work - Duc-Park-Lee-Kim RFID Protocol [10] (2/2)
8 Relate Work - Chien-Chen RFID Protocol [9](1/2)
9 Relate Work - Chien-Chen RFID Protocol [9] (2/2)
Proposed Scheme1 - Scheme design 3 Trivial protocol TRAP 0 - RNG TRAP 1 - Modify RNG TRAP 2 - Anonymity (TRAP 3 Class2 Gen2) 10
11 Proposed Scheme1 - TRAP 0
Proposed Scheme1 - TRAP 1(1/2) 12 Pseudo-random number generator(PRNG) Concerns exhaustive-key attacks Concerns related-key attacks Pseudo-random function (PRF)
13 Proposed Scheme1 - TRAP 1(2/2)
14 Proposed Scheme1 - TRAP 2*
A Practical Approach for Enhancing Security of EPC global RFID Gen2 Tag Source : Future Generation Communication and Networking, VOL. 1, NO. 5, Dec 2007, pp Authors :Jaemin Park
Proposed Scheme2 - Setting 16
17 Proposed Scheme2 - Authenticate (1/2)
18 Proposed Scheme2 - Authenticate (2/2)
Comparison - A Practical Approach for Enhancing Security of EPC global RFID Gen2 Tag 19
Conclusions Two papers can both follow C1Gen2 Both can defense replay attack and have anonymity 20