透過您的圖書館登入
IP:3.133.149.168
  • 期刊
  • OpenAccess

An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification

並列摘要


Low-cost Radio Frequency Identification (RFID) tags are devices with very limited computational capability, in which only 250-4K logic gates can be devoted to security-related tasks. Classical cryptographic primitives such as block ciphers or hash functions are well beyond the computational capabilities of low-cost RFID tags, as ratified by the EPCglobal Class-1 Gen-2 RFID specification. Moreover, the Gen-2 RFID specification does not pay due attention to security. For this reason, an efficient Ultra Light Authentication Protocol (ULAP) is proposed in this paper. This new scheme offers an adequate security level against passive attacks, and is compliant with Gen-2 RFID specification.

被引用紀錄


Hao, L. B. (2015). 利用具因果關係之執行軌跡進行一般用途圖形處理器之晶片網路模擬的有效性 [master's thesis, National Tsing Hua University]. Airiti Library. https://doi.org/10.6843/NTHU.2015.00372

延伸閱讀