Download presentation
Presentation is loading. Please wait.
Published byJeremy Houston Modified over 9 years ago
1
RFID Paper presentation The Security of EPC Gen2 Compliant RFID Protocols Source : Applied Cryptography and Network Security, VOL. 5037, 2008, pp. 490-506 Authors :Mike Burmester, Breno De Medeiros Speaker : Chia- Hung Chang Date : 2012-11-25 A Practical Approach for Enhancing Security of EPC global RFID Gen2 Tag Source : Future Generation Communication and Networking, VOL. 1, NO. 5, Dec 2007, pp.436-441 Authors :Jaemin Park
2
Outline Introduction Relate Work Proposed Scheme Security analysis Conclusion & Future Work 2
3
Introduction(1/2) 3 Sever Tag Reader (3)Authenticate (1)Request (2)Response (4) Forward phase
4
Introduction(2/2) Tag in C1Gen2 only can use Pseudo-random number generator(PRNG) - 16 bits Cyclic Redundancy Code(CRC) - 16 bits 4
5
Protocol notations 5 Tag Reader Tag issuing system Backend sever with DB RFID code (eg. EPC) PC bits Access password Kill password Random numbers
6
6 Relate Work - Duc-Park-Lee-Kim RFID Protocol [10](1/2)
7
7 Relate Work - Duc-Park-Lee-Kim RFID Protocol [10] (2/2)
8
8 Relate Work - Chien-Chen RFID Protocol [9](1/2)
9
9 Relate Work - Chien-Chen RFID Protocol [9] (2/2)
10
Proposed Scheme1 - Scheme design 3 Trivial protocol TRAP 0 - RNG TRAP 1 - Modify RNG TRAP 2 - Anonymity (TRAP 3 Class2 Gen2) 10
11
11 Proposed Scheme1 - TRAP 0
12
Proposed Scheme1 - TRAP 1(1/2) 12 Pseudo-random number generator(PRNG) Concerns exhaustive-key attacks Concerns related-key attacks Pseudo-random function (PRF)
13
13 Proposed Scheme1 - TRAP 1(2/2)
14
14 Proposed Scheme1 - TRAP 2*
15
A Practical Approach for Enhancing Security of EPC global RFID Gen2 Tag Source : Future Generation Communication and Networking, VOL. 1, NO. 5, Dec 2007, pp.436-441 Authors :Jaemin Park
16
Proposed Scheme2 - Setting 16
17
17 Proposed Scheme2 - Authenticate (1/2)
18
18 Proposed Scheme2 - Authenticate (2/2)
19
Comparison - A Practical Approach for Enhancing Security of EPC global RFID Gen2 Tag 19
20
Conclusions Two papers can both follow C1Gen2 Both can defense replay attack and have anonymity 20
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.