{"title":"基于ECC加密方案的RFID认证协议","authors":"M. Benssalah, M. Djeddou, Karim Drouiche","doi":"10.1109/RFID-TA.2012.6404575","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a new RFID authentication protocol based on elliptic curves ElGamal encryption schemes. The proposed protocol needs two passes, requires only scalar point multiplications operation and can resist to various kinds of attacks such as man-in-the-middle attack, simple power analysis, and replay attacks.These features make it very attractive to low cost RFID applications, such as the biometric passport active authentication (AA) for example. The proposed protocol is tested and simulated in c ≠ language for several NIST recommended curves over GF(p) (p = 112; 128; 160; 192 and 256 bits).","PeriodicalId":232862,"journal":{"name":"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"RFID authentication protocols based on ECC encryption schemes\",\"authors\":\"M. Benssalah, M. Djeddou, Karim Drouiche\",\"doi\":\"10.1109/RFID-TA.2012.6404575\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a new RFID authentication protocol based on elliptic curves ElGamal encryption schemes. The proposed protocol needs two passes, requires only scalar point multiplications operation and can resist to various kinds of attacks such as man-in-the-middle attack, simple power analysis, and replay attacks.These features make it very attractive to low cost RFID applications, such as the biometric passport active authentication (AA) for example. The proposed protocol is tested and simulated in c ≠ language for several NIST recommended curves over GF(p) (p = 112; 128; 160; 192 and 256 bits).\",\"PeriodicalId\":232862,\"journal\":{\"name\":\"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RFID-TA.2012.6404575\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RFID-TA.2012.6404575","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
RFID authentication protocols based on ECC encryption schemes
In this paper, we propose a new RFID authentication protocol based on elliptic curves ElGamal encryption schemes. The proposed protocol needs two passes, requires only scalar point multiplications operation and can resist to various kinds of attacks such as man-in-the-middle attack, simple power analysis, and replay attacks.These features make it very attractive to low cost RFID applications, such as the biometric passport active authentication (AA) for example. The proposed protocol is tested and simulated in c ≠ language for several NIST recommended curves over GF(p) (p = 112; 128; 160; 192 and 256 bits).