{"title":"How to improve security and reduce hardware demands of the WIPR RFID protocol","authors":"Jiang Wu, Douglas R Stinson","doi":"10.1109/RFID.2009.4911191","DOIUrl":null,"url":null,"abstract":"In this paper, we analyze and improve WIPR, an RFID identification scheme based on public key techniques with efficient hardware implementation. First we analyze the security and privacy features of WIPR. We show that a reduced version of WIPR is vulnerable to short padding attacks and WIPR needs a random number generator with certain properties to withstand reset attacks. We discuss countermeasures to avoid these attacks. Then we propose two variants of WIPR, namely WIPR-SAEP and WIPR-RNS, to improve its security and to further reduce its hardware cost. Using an additional hash function, WIPR-SAEP achieves provable security in the sense that violating the security properties leads to solving the integer factoring problem. WIPR-RNS uses a residue number system (RNS) for computation, and reduces the hardware costs of WIPR. WIPR-RNS provides a better security guarantee than WIPR in that it does not use a non-standard cryptographic primitive in WIPR. WIPR-SAEP and WIPR-RNS can be combined into one scheme.","PeriodicalId":417077,"journal":{"name":"2009 IEEE International Conference on RFID","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"29","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Conference on RFID","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RFID.2009.4911191","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 29
Abstract
In this paper, we analyze and improve WIPR, an RFID identification scheme based on public key techniques with efficient hardware implementation. First we analyze the security and privacy features of WIPR. We show that a reduced version of WIPR is vulnerable to short padding attacks and WIPR needs a random number generator with certain properties to withstand reset attacks. We discuss countermeasures to avoid these attacks. Then we propose two variants of WIPR, namely WIPR-SAEP and WIPR-RNS, to improve its security and to further reduce its hardware cost. Using an additional hash function, WIPR-SAEP achieves provable security in the sense that violating the security properties leads to solving the integer factoring problem. WIPR-RNS uses a residue number system (RNS) for computation, and reduces the hardware costs of WIPR. WIPR-RNS provides a better security guarantee than WIPR in that it does not use a non-standard cryptographic primitive in WIPR. WIPR-SAEP and WIPR-RNS can be combined into one scheme.