• DocumentCode
    588244
  • Title

    RFID authentication protocols based on ECC encryption schemes

  • Author

    Benssalah, M. ; Djeddou, Mustapha ; Drouiche, K.

  • Author_Institution
    Comm Syst. Lab., Ecole Militaire Polytech., Algiers, Algeria
  • fYear
    2012
  • fDate
    5-7 Nov. 2012
  • Firstpage
    97
  • Lastpage
    100
  • Abstract
    In this paper, we propose a new RFID authentication protocol based on elliptic curves ElGamal encryption schemes. The proposed protocol needs two passes, requires only scalar point multiplications operation and can resist to various kinds of attacks such as man-in-the-middle attack, simple power analysis, and replay attacks.These features make it very attractive to low cost RFID applications, such as the biometric passport active authentication (AA) for example. The proposed protocol is tested and simulated in c ≠ language for several NIST recommended curves over GF(p) (p = 112; 128; 160; 192 and 256 bits).
  • Keywords
    cryptographic protocols; public key cryptography; radiofrequency identification; telecommunication security; ECC encryption schemes; NIST recommended curves; RFID authentication protocols; biometric passport active authentication; c ≠ language; elliptic curve ElGamal encryption scheme; low-cost RFID applications; man-in-the-middle attack; power analysis; replay attacks; scalar point multiplication operation; Authentication; Elliptic curve cryptography; Elliptic curves; Encryption; Protocols; Radiofrequency identification;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    RFID-Technologies and Applications (RFID-TA), 2012 IEEE International Conference on
  • Conference_Location
    Nice
  • Print_ISBN
    978-1-4673-4656-6
  • Electronic_ISBN
    978-1-4673-4658-0
  • Type

    conf

  • DOI
    10.1109/RFID-TA.2012.6404575
  • Filename
    6404575