230 likes | 482 Views
RFID Paper presentation. The Security of EPC Gen2 Compliant RFID Protocols Source : Applied Cryptography and Network Security, VOL. 5037, 2008, pp. 490-506 Authors : Mike Burmester , Breno De Medeiros. A Practical Approach for Enhancing Security of EPC global RFID Gen2 Tag
E N D
RFID Paper presentation The Security of EPC Gen2 Compliant RFID Protocols Source : Applied Cryptography and Network Security, VOL. 5037, 2008, pp. 490-506 Authors :Mike Burmester,Breno De Medeiros • A Practical Approach for Enhancing Security of EPC global RFID Gen2 Tag • Source : Future Generation Communication and Networking, VOL. 1, NO. 5, Dec 2007, pp.436-441 • Authors :Jaemin Park Speaker : Chia- Hung Chang Date : 2012-11-25
Outline • Introduction • RelateWork • Proposed Scheme • Security analysis • Conclusion& Future Work
Introduction(1/2) Tag Reader Sever (1)Request (2)Response (2)Response (3)Authenticate (4) Forward phase (4) Forward phase
Introduction(2/2) Tag in C1Gen2 only can use • Pseudo-random number generator(PRNG) - 16 bits • Cyclic Redundancy Code(CRC) - 16 bits
Proposed Scheme1- Scheme design • 3Trivial protocol • TRAP 0 - RNG • TRAP 1 - Modify RNG • TRAP 2 - Anonymity (TRAP 3 Class2 Gen2)
Proposed Scheme1- TRAP 1(1/2) • Pseudo-random number generator(PRNG) • Concerns exhaustive-key attacks • Concerns related-key attacks • Pseudo-random function (PRF)
A Practical Approach for Enhancing Security of EPC global RFID Gen2 Tag Source : Future Generation Communication and Networking, VOL. 1, NO. 5, Dec 2007, pp.436-441 Authors :JaeminPark
Comparison- A Practical Approach for Enhancing Security of EPC global RFID Gen2 Tag
Conclusions • Two papers can both follow C1Gen2 • Both can defense replay attack and have anonymity