Download presentation
Presentation is loading. Please wait.
Published byRosa Palmer Modified over 9 years ago
1
Primitive Operations
2
Communication Operations –Reader to tag Read Write –Tag to Tag Read Write Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256, Sha-512 –Encryption: Symmetric: AES, DES Asymmetric: RSA Two Types of Operations
3
An example of RFID security protocol –A challenge-response protocol Pass 1: the reader sends a challenge C Pass 2: the tag returns a response F(C, key) Reader RFID tag Challenge C Response F(C, key) Reader to tag: Write Reader to tag: Read Tag to tag: Read Tag to tag: Write Hash or encryption: F(*) An Example
4
An example of RFID security protocol –A challenge-response protocol RFID tag Tag to tag: ReadTag to tag: Write F(x, y) C………Key F(C, Key) A hash or encryption A memory bank Tag to Tag Operations
5
Time Requirements Tag to Tag Operations –Read: 0.007 ms, Write: 16.73 ms, one word Reader to Tag Operations –Read: 47 ms one word, 57 ms 15 words, 0.5 ms +1 word
6
Time Requirements Tag to Tag Operations –Read: 0.007 ms, Write: 16.73 ms, one word Reader to Tag Operations –Read: 47 ms one word, 57 ms 15 words, 0.5 ms +1 word –Write: 63 ms one word, increment: 20 ms / word
7
Time Requirements Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256, Sha-512 Block size (bytes): one blockn blocks MD5: 5555 + 64n Sha-1: 5555 + 64n Sha-256: 5555 + 64n Sha-512: 111111+128n
8
Time Requirements Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256, Sha-512 MD5: 1.8 ms one block, 3.2 ms two blocks
9
Time Requirements Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256, Sha-512 Sha-1: 5.0ms / block
10
Time Requirements Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256, Sha-512 Sha-256: 11.6ms / block
11
Time Requirements Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256, Sha-512 Sha-512: 41.0ms / block
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.