Radio Frequency Identification (RFID) systems can be found in wide spread applications - from simple theft prevention over multi bit transponders up to complex applications involving contactless smartcards. This paper shows that the security gap between low-cost RFID Tags that only provide simple security features and contactless smartcards can be filled. It is examined how much energy a passive tag can gain from a magnetic field and which amount is needed by basic logic functions. The gate-equivalents of several cryptographic operations are then compared with the available energy and a conclusion is drawn if they are feasible for RFID tags. © IFIP International Federation for Information Processing 2006.
CITATION STYLE
Lohmann, T., Schneider, M., & Ruland, C. (2006). Analysis of power constraints for cryptographic algorithms in mid-cost RFID tags. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3928 LNCS, pp. 278–288). https://doi.org/10.1007/11733447_20
Mendeley helps you to discover research relevant for your work.