Scalable RFID Authentication Protocols Using Quadratic Residues
Date Issued
2006
Date
2006
Author(s)
Chung, Sheng-Wen
DOI
zh-TW
Abstract
A radio frequency identification (RFID) system is an automatic identification technology using radio frequency. RFID applications are very useful in our daily life. A poorly-designed RFID system may cause privacy problems. Although a lot of authentication protocols have been proposed to solve privacy problems, many of them are inefficient or unscalable. Quadratic residue cryptosystems are secure, efficient, and easy to compute, therefore they are very suitable for RFID authentication protocols. In this thesis, we propose new RFID authentication protocols using quadratic residues. They not only solve privacy problems, but also make RFID systems efficient and scalable.
An authentication protocol does not always satisfy security, performance and cost requirement of an application at the same time. We propose two protocols for normal security requirement and high security requirement. Protocol 1 can prevent passive attacks. Protocol 2 can prevent passive and active attacks. Both protocol 1 and protocol 2 have high performance and low cost. Our protocols are suitable for real-world commercial implementations.
An authentication protocol does not always satisfy security, performance and cost requirement of an application at the same time. We propose two protocols for normal security requirement and high security requirement. Protocol 1 can prevent passive attacks. Protocol 2 can prevent passive and active attacks. Both protocol 1 and protocol 2 have high performance and low cost. Our protocols are suitable for real-world commercial implementations.
Subjects
無線射頻辨識系統
認證協定
二次剩餘
RFID
Authentication Protocol
Quadratic Residue
Type
thesis
File(s)![Thumbnail Image]()
Loading...
Name
ntu-95-R93944016-1.pdf
Size
23.31 KB
Format
Adobe PDF
Checksum
(MD5):0f672f91b4663882c6cd5562b4ebc467