DocumentCode
588244
Title
RFID authentication protocols based on ECC encryption schemes
Author
Benssalah, M. ; Djeddou, Mustapha ; Drouiche, K.
Author_Institution
Comm Syst. Lab., Ecole Militaire Polytech., Algiers, Algeria
fYear
2012
fDate
5-7 Nov. 2012
Firstpage
97
Lastpage
100
Abstract
In this paper, we propose a new RFID authentication protocol based on elliptic curves ElGamal encryption schemes. The proposed protocol needs two passes, requires only scalar point multiplications operation and can resist to various kinds of attacks such as man-in-the-middle attack, simple power analysis, and replay attacks.These features make it very attractive to low cost RFID applications, such as the biometric passport active authentication (AA) for example. The proposed protocol is tested and simulated in c ≠ language for several NIST recommended curves over GF(p) (p = 112; 128; 160; 192 and 256 bits).
Keywords
cryptographic protocols; public key cryptography; radiofrequency identification; telecommunication security; ECC encryption schemes; NIST recommended curves; RFID authentication protocols; biometric passport active authentication; c ≠ language; elliptic curve ElGamal encryption scheme; low-cost RFID applications; man-in-the-middle attack; power analysis; replay attacks; scalar point multiplication operation; Authentication; Elliptic curve cryptography; Elliptic curves; Encryption; Protocols; Radiofrequency identification;
fLanguage
English
Publisher
ieee
Conference_Titel
RFID-Technologies and Applications (RFID-TA), 2012 IEEE International Conference on
Conference_Location
Nice
Print_ISBN
978-1-4673-4656-6
Electronic_ISBN
978-1-4673-4658-0
Type
conf
DOI
10.1109/RFID-TA.2012.6404575
Filename
6404575
Link To Document