A variant of implementation of the AES algorithm in RFID systems
DOI: 10.31673/2409-7292.2021.045158
DOI:
https://doi.org/10.31673/2409-7292.2021.045158Abstract
This paper presents basic information about RFID systems and a brief analysis of the main cryptographic algorithms traditionally used in them. The main work was done on the development and hardware implementation of the AES encryption algorithm, which should theoretically help protect against most of the above attacks.
Key words: RFID, AES, radio frequency identification.
References
1. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, Second Edition, Klaus Finkenzeller, Copyright 2003 John Wiley & Sons, Ltd.
2. A. Juels and R. Pappu Squealing Euros: Privacy protection in RFID-enabled banknotes. In Financial Cryptography, 7th International Conference, Revised Papers, volume 2742 of Lecture Notes in Computer Science, pages 103–121. Springer, 2003.
3. A. Juels, R. L. Rivest, and M. Szydlo. The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In Proceedings of the 10th ACM Conference on Computer and Communication Security, pages 103–111.
4. S. A. Weis. Security and Privacy in Radio-Frequency Identification Devices. Master‘s thesis, Massachusetts Institute of Technology, Cambridge, MA 02139, May 2003.
5. International Organization for Standardization. ISO/IEC 9798-2: Information Technology - Security techniques ‒ Entity Authentication Mechanisms Part 2: Entity authentication using symmetric techniques. ISO/IEC, 1993.
6. International Organization for Standardization. ISO/IEC 18000-3. Information Technology AIDC Techniques ‒ RFID for Item Management, March 2003.
7. S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In Security in Pervasive Computing, 1st Annual Conference on Security in Pervasive Computing, Boppard, Germany, March 12-14, 2003, Revised Papers, volume 2802 of Lecture Notes in Computer Science, pages 201–212. Springer, 2004
8. S. E. Sarma, S. A. Weis, and D. W. Engels. RFID Systems and Security and Privacy Implications. In Cryptographic Hardware and Embedded Systems – CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, volume 2523 of Lecture Notes in Computer Science, pages 454–470. Springer, 2002
9. A. Juels and R. Pappu. Squealing Euros: Privacy protection in RFID-enabled banknotes. In Financial Cryptography, 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers, volume 2742 of Lecture Notes in Computer Science, pages 103–121. Springer, 2003
10. A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997. Available online at http://www.cacr.math.uwaterloo.ca/hac/
11. J. Hoffstein, J. Pipher, and J. H. Silverman. NTRU: A Ring-Based Public Key Cryptosystem. In Algorithmic Number Theory, Third International Symposium, ANTS-III, Portland, Oregon, USA, June 21-25, 1998, Proceedings, volume 1423 of Lecture Notes in Computer Science, pages 267–288. Springer, 1998.
12. A. May. Cryptanalysis of NTRU. preprint, (unpublished), February 1999.
13. J. Wolkerstorfer, E. Oswald, and M. Lamberger. An ASIC implementation of the AES SBoxes. In Topics in Cryptology - CT-RSA 2002, The Cryptographer‘s Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, volume 2271 of Lecture Notes in Computer Science, pages 67–78. Springer, 2002.
14. Alex Biryukov. Related-key Cryptanalysis of the Full AES-192 and AES-256 [Електронний ресурс] / Alex Biryukov, Dmitry Khovratovich // University of Luxembourg. – 2009. – Режим доступу до ресурсу: http://www.impic.org/papers/Aes-192-256.pdf