Analysis of power constraints for cryptographic algorithms in mid-cost RFID tags

  • Authors:
  • Tobias Lohmann;Matthias Schneider;Christoph Ruland

  • Affiliations:
  • Institute for Data Communication Systems, University of Siegen, Siegen, Germany;Institute for Data Communication Systems, University of Siegen, Siegen, Germany;Institute for Data Communication Systems, University of Siegen, Siegen, Germany

  • Venue:
  • CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Radio Frequency Identification (RFID) systems can be found in wide spread applications – from simple theft prevention over multi bit transponders up to complex applications involving contactless smartcards. This paper shows that the security gap between low-cost RFID Tags that only provide simple security features and contactless smartcards can be filled. It is examined how much energy a passive tag can gain from a magnetic field and which amount is needed by basic logic functions. The gate-equivalents of several cryptographic operations are then compared with the available energy and a conclusion is drawn if they are feasible for RFID tags.