DocumentCode :
2200578
Title :
PUF-based Encryption Processor for the RFID Systems
Author :
Choi, Wonseok ; Kim, Sungsoo ; Kim, Yonghwan ; Park, Yongsoo ; Ahn, Kwangseon
Author_Institution :
Sch. of Electr. Eng. & Comput. Sci., Kyungpook Nat. Univ., Daegu, South Korea
fYear :
2010
fDate :
June 29 2010-July 1 2010
Firstpage :
2323
Lastpage :
2328
Abstract :
The attacker can access the RFID systems illegally because authentication operations on the RFID systems are performed in wireless communication. Authentication methods based on the PUF were presented to defend attacks. Because these utilize Hash and AES, the cost is expensive for the low-cost RFID tag. In this paper, the PUF-based encryption processor and the low-cost RFID authentication protocol are proposed. The challenge-response pairs (PUF´s input and output) are encrypted by the PUF´s characteristics, not by Hash and AES. Besides, the encryption method is changed by the instruction code. Therefore, it is difficult for the attacker to analyze challenge-response pairs. The proposed scheme defends several kinds of attacks, which are physical, modeling, spoofing and location tracking attacks. We implemented the PUF-based encryption processor at low cost with small footprint and low power.
Keywords :
authorisation; cryptographic protocols; embedded systems; instruction sets; integrated circuit design; radiofrequency identification; AES; Hash; PUF; RFID system; authentication protocol; encryption processor; instruction code; physically unclonable function; wireless communication; Authentication; Encryption; Protocols; Radiofrequency identification; Registers; Servers; Authentication Protocol; Digital Circuit Design; PUF; RFID Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on
Conference_Location :
Bradford
Print_ISBN :
978-1-4244-7547-6
Type :
conf
DOI :
10.1109/CIT.2010.400
Filename :
5578316
Link To Document :
بازگشت