Skip to Main Content
RFID has been widely used in personal life. To the security problems of RFID, there are many different kinds of strategies and protocol, This article point out the disadvantages of these protocols, then come up with One block Hash function, and make a comparison with the most popular MD5 algorithm, improve the RFID authentication protocol by One block Hash function, and show the comparison with the now most popular algorithm on the security, computation and memory capability. This RFID authentication protocol based on one block Hash function can guarantee the safety, meanwhile, reduce the amount of computation of the tag, and achieve the function of low-power in authentic process of tags. It has resolved the two shackles in the development of the RFID system.
Date of Conference: Nov. 29 2011-Dec. 1 2011