Abstract
In this paper, we will present the design and implementation of the crypto coprocessors which can be used for providing the RFID security. By analyzing the power consumption characteristics of our crypto coprocessors, we can see which crypto algorithms can be used for highly resource constrained applications such as RFID. To provide the security mechanism such as integrity and authentication between the RFID tag and the RFID reader, crypto algorithm or security protocol should be implemented at the RFID tag and reader. Moreover, the security mechanism in the RFID tag should be implemented with low power consumption because the resources of RFID tag are highly constrained, that is, the RFID tag has low computing capability and the security mechanism which operates in the RFID tag should be low power consumed. After investigating the power consumption characteristics of our designed crypto processors, we will conclude which crypto algorithm is suitable for providing the security of RFID systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: CHES, pp. 357–370 (2004)
Juels, A., Rivest, R.L., Szydlo, M.: The blocker tag: selective blocking of RFID tags for consumer privacy. In: Atluri, V., Liu, P. (eds.) Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS 2003), October 27-30, pp. 103–111. ACM Press, New York (2003)
Kim, W., Kim, S., Bae, Y., Jun, S., Park, Y., Cho, H.: A platform-based soc design of a 32-bit smart card. ETRI Journal 25(6), 510–516 (2003)
Kang, J.-S., Preneel, B., Ryu, H., Chung, K.I., Park, C.H.: Pseudorandomness of basic structures in the block cipher KASUMI. ETRI Journal 25(2), 89–100 (2003)
Lee, D.H., Chee, S., Hwang, S.C., Ryou, J.-C.: Improved scalar multiplication on elliptic curves defined over F_2mn. ETRI Journal 26(3), 241–251 (2004)
Lee, C., Lee, J.: A scalable structure for a multiplier and an inversion unit in GF(2m). ETRI Journal 25(5), 315–320 (2003)
Stallings, W.: Cryptography and Network Security: Principles and Practice, 3rd edn. Prentice Hall, Upper Saddle River (2003)
Vajda, I.A., An, L.B.: Lightweight authentication protocols for low-cost RFID tags, August 06 (2003)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: SPC, pp. 201–212 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, H., Lee, MK., Kim, DK., Chung, SK., Chung, K. (2005). Design and Implementation of Crypto Co-processor and Its Application to Security Systems. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_165
Download citation
DOI: https://doi.org/10.1007/11596981_165
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30819-5
Online ISBN: 978-3-540-31598-8
eBook Packages: Computer ScienceComputer Science (R0)