Download presentation
Presentation is loading. Please wait.
Published byDonald Sharp Modified over 9 years ago
1
Radio Frequency Identification Securing Your Personal Information November 10, 2005
2
What is RFID? Radio Frequency Identification 1.RF Transmitter & Reader 2.RFID-Enabled Transponder RF Transmitter broadcasts signal RFID-Enabled Transponder RF Transmitter & Reader Signal RFID Data
3
RFID in the Marketplace RFID technology is present in many areas of business 1 “Blink” credit card processing Image provided by: JP Morgan Chase & Co.
4
RFID in the Marketplace RFID technology is present in many areas of business 1 “Blink” credit card processing 2Employee identification Image provided by: RFID USA
5
RFID in the Marketplace RFID technology is present in many areas of business 1 “Blink” credit card processing 2Employee identification 3US Passports Image provided by: US Department of State
6
Security Standards RFID uses basic hash table encryption 3RF Transmitters can be easily replicated 4Transponders can be activated unintentionally RFID-Enabled Transponder RF Transmitter & Reader 1. Transponder Activation Signal 2. Encrypted Data Card Number: 54485891230985648923098435709634098234579523
7
Linear Probing Image provided by: http://www.cs.umu.se/~jopsi/dinf504/hashing_probe.gif
8
Double Hashing RFID uses basic hash table encryption 3RF Transmitters can be easily replicated 4Transponders can be activated unintentionally RFID-Enabled Transponder RF Transmitter & Reader 1. Transponder Activation Signal 2. Encrypted Data Card Number: 5485891230985648923098435709634098234579523 Key mod 5 Key mod 20
9
Double Hashing H1(key) = Key mod 5 H2(key) Key mod 20 2 * (Key mod 20) 3 * (Key mod 20) 4 * (Key mod 20) [H1(key) +i*H2(key)] % M Image provided by: http://www.cs.umu.se/~jopsi/dinf504/hashing_probe.gif
10
Questions
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.