TY - GEN
T1 - Analysis and improvement of a pseudorandom number generator for EPC Gen2 tags
AU - Melia-Segui, J.
AU - Garcia-Alfaro, J.
AU - Herrera-Joancomarti, J.
PY - 2010/9/6
Y1 - 2010/9/6
N2 - The EPC Gen2 is an international standard that proposes the use of Radio Frequency Identification (RFID) in the supply chain. It is designed to balance cost and functionality. The development of Gen2 tags faces, in fact, several challenging constraints such as cost, compatibility regulations, power consumption, and performance requirements. As a consequence, security on board of Gen2 tags is often minimal. It is, indeed, mainly based on the use of on board pseudorandomness. This pseudorandomness is used to blind the communication between readers and tags; and to acknowledge the proper execution of password-protected operations. Gen2 manufacturers are often reluctant to show the design of their pseudorandom generators. Security through obscurity has always been ineffective. Some open designs have also been proposed. Most of them fail, however, to prove their correctness. We analyze a recent proposal presented in the literature and demonstrate that it is, in fact, insecure. We propose an alternative mechanism that fits the Gen2 constraints and satisfies the security requirements.
AB - The EPC Gen2 is an international standard that proposes the use of Radio Frequency Identification (RFID) in the supply chain. It is designed to balance cost and functionality. The development of Gen2 tags faces, in fact, several challenging constraints such as cost, compatibility regulations, power consumption, and performance requirements. As a consequence, security on board of Gen2 tags is often minimal. It is, indeed, mainly based on the use of on board pseudorandomness. This pseudorandomness is used to blind the communication between readers and tags; and to acknowledge the proper execution of password-protected operations. Gen2 manufacturers are often reluctant to show the design of their pseudorandom generators. Security through obscurity has always been ineffective. Some open designs have also been proposed. Most of them fail, however, to prove their correctness. We analyze a recent proposal presented in the literature and demonstrate that it is, in fact, insecure. We propose an alternative mechanism that fits the Gen2 constraints and satisfies the security requirements.
U2 - 10.1007/978-3-642-14992-4_4
DO - 10.1007/978-3-642-14992-4_4
M3 - Conference contribution
AN - SCOPUS:77956135384
SN - 364214991X
SN - 9783642149917
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 34
EP - 46
BT - Financial Cryptography and Data Security - FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Revised Selected Papers
T2 - 14th Financial Cryptograpy and Data Security International Conference, FC 2010
Y2 - 25 January 2010 through 28 January 2010
ER -