Skip to Main Content
In these days the RFID technology is used widespread. This technology can be found in the utmost fields of our daily life, e.g. supply-chain management, libraries, access management etc. Since the first RFID Tags possessed very small computational capacity only mathematical and logical operations and one-way hash functions could be used. However, in the last years RFID technology achieved that CPU speed on which PKI systems can be run. In this paper we present our elliptic curve cryptography based authentication protocol which proofs against the well-known attacks. Furthermore, we introduce a performance analysis and a comparison with other EC based protocols. By examining the simulation results we prove that our protocol has better performance characteristics than others or at least equals them.
Date of Conference: 15-16 Sept. 2011