You are looking at a specific version 20110717:071453 of this paper. See the latest version.

Paper 2011/381

A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem

Yalin Chen , Jue-Sam Chou , Chi-Fong Lin , Cheng-Lun Wu

Abstract

Recently, many researchers have proposed RFID authentication protocols. These protocols are mainly consists of two types: symmetric key based and asymmetric key based. The symmetric key based systems usually have some weaknesses such as suffering brute force, de-synchronization, impersonation, and tracing attacks. In addition, the asymmetric key based systems usually suffer from impersonation, man-in-the-middle, physical, and tracing attacks. To get rid of those weaknesses and reduce the system workload, we adopt elliptic curve cryptosystem (ECC) to construct an asymmetric key based RFID authentication system. Our scheme needs only two passes and can resist various kinds of attacks. It not only outperforms the other RFID schemes having the same security level but also is the most efficient.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Keywords
radio frequency identificationRFIDidentification protocolprivacy
Contact author(s)
jschou @ mail nhu edu tw
History
2011-07-17: revised
2011-07-15: received
See all versions
Short URL
https://ia.cr/2011/381
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.