A Secure Authentication Protocol for Low-Cost Radio Frequency Identification Systems based on Modular Exponentiation

2011 ◽  
Vol 6 (7) ◽  
pp. 242-251
Author(s):  
Batbold Toiruul ◽  
KyungOh Lee ◽  
Young Han Lee ◽  
Aries Kusdaryono ◽  
Nurhayati
Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.


2018 ◽  
Vol 14 (8) ◽  
pp. 155014771879512 ◽  
Author(s):  
Madiha Khalid ◽  
Umar Mujahid ◽  
Muhammad Najam-ul-Islam

Internet of Things is one of the most important components of modern technological systems. It allows the real time synchronization and connectivity of devices with each other and with the rest of the world. The radio frequency identification system is used as node identification mechanism in the Internet of Thing networks. Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. To reduce the overall cost of radio frequency identification enabled Internet of Thing network security, the researchers use simple bitwise logical operations such as XOR, AND, OR, and Rot and have proposed many ultralightweight mutual authentication protocols. However, almost all the previously proposed protocols were later found to be vulnerable against several attack models. Recently, a new ultralightweight mutual authentication protocol has been proposed which involves only XOR and Rotation functions in its design and claimed to be robust against all possible attack models. In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. We have exploited weak structure of the protocol messages and proposed three attacks against the said protocol: one desynchronization and two full disclosure attacks.


2020 ◽  
Vol 63 (8) ◽  
pp. 1271-1271
Author(s):  
Qianqian Su ◽  
Rui Zhang ◽  
Rui Xue

Abstract Modular exponentiation, as a fundamental operation used in many public-key cryptosystems, has always be considered to be very time-consuming. It is difficult for some devices with limited computation capability, such as mobile devices and low-cost radio frequency identification (RFID) tags, to perform large-scale modular exponentiations. In cryptosystems, one typical case of modular exponentiation is that the modulus is a composite number. For instance, in RSA algorithm, the modulus is the product of two distinct prime numbers. In this paper, we investigate how to securely and efficiently outsource composite modular exponentiations and put forward two secure outsourcing algorithms for composite modular exponentiations based on single untrusted cloud. The first algorithm, named MCExp, is designed for outsourcing single composite modular exponentiation, i.e. $u^a$ mod $N$. The second algorithm, named SMCExp, is designed for outsourcing simultaneous composite modular exponentiation, i.e. $\prod ^{n}_{i=1}u^{a_i}_{i}$ mod $N$. Different from algorithms based on two untrusted servers, the proposed algorithms are very practical because they avoid the strong assumption that there must exist two servers without collusion. The proposed algorithms not only protect the privacy of the exponent and the base simultaneously, but also enable users to verify the correctness of the result returned by the cloud with high probability. Compared with using the square-and-multiply algorithm, the user can achieve higher efficiency by using the proposed algorithms. Besides, we prove the security of our algorithms and conduct several experiments to demonstrate the efficiency of the proposed algorithms. Finally, we show that the proposed algorithms can be used to construct the secure outsourcing algorithms for Shamir’s identity-based signature and identity-based multi-signature.


Electronics ◽  
2020 ◽  
Vol 9 (12) ◽  
pp. 2116
Author(s):  
Wazie M. Abdulkawi ◽  
Khaled Issa ◽  
Abdel-Fattah A. Sheta ◽  
Saleh A. Alshebeili

There is a growing interest in chipless radio-frequency identification (RFID) technology for a number of Internet of things (IoT) applications. This is due to its advantages of being of low-cost, low-power, and fully printable. In addition, it enjoys ease of implementation. In this paper, we present a novel, compact, chipless radio-frequency identification (RFID) tag that can be read with either vertical or horizontal polarization within its frequency bandwidth. This increases the sturdiness and detection ability of the RFID system. In addition, the difference between the vertical and horizontal responses can be used for tag identification. The proposed tag uses strip length variations to double the coding capacity and thereby reduce the overall size by almost 50%. It has a coding capacity of 20 bits in the operating bandwidth 3 GHz–7.5 GHz, and its spatial density is approximately 11 bits/cm2. The proposed tag has a 4.44 bits/GHz spectral capacity, 2.44 bits/cm2/GHz encoding capacity, a spatial density at the center frequency of 358.33 bits/λ2, and an encoding capacity at the center frequency of 79.63 bits/λ2/GHz. A prototype is fabricated and experimentally tested at a distance of 10 cm from the RFID reader system. Then, we compare the measured results with the simulations. The simulated results are in reasonable agreement with the simulated ones.


2013 ◽  
Vol 303-306 ◽  
pp. 2207-2210 ◽  
Author(s):  
Ming Li ◽  
Zhao Peng Dai ◽  
Fang Xi

In order to overcome the high complexity of the tag in RFID, a new XOR scheme is proposed based on the relationship between X and Z for X XOR (X + On) =Z. As only XOR and random number generator are required to be computed by tags,it is very suitable for low—cost Radio Frequency Identification(RFID) system .


Sign in / Sign up

Export Citation Format

Share Document