RFID-tags for anti-counterfeiting

被引:0
作者
Tuyls, P
Batina, L
机构
[1] Philips Res Labs, NL-5656 AA Eindhoven, Netherlands
[2] Katholieke Univ Leuven, ESAT, COSIC, B-3001 Heverlee, Belgium
来源
TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS | 2006年 / 3860卷
关键词
RFID; counterfeiting; authentication; ECC; physical unclonable function (PUF);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. This chip functionality makes it possible to verify the authenticity of a product and hence to detect and prevent counterfeiting. In order to be successful for these security purposes too, RFID-tags have to be resistant against many attacks, in particular against cloning of the tag. In this paper, we investigate how an RFID-tag can be made unclonable by linking it inseparably to a Physical Unclonable Function (PUF). We present the security protocols that are needed for the detection of the authenticity of a product when it is equipped with such a system. We focus on off-line authentication because it is very attractive from a practical point of view. We show that a PUF based solution for RFID-tags is feasible in the off-line case.
引用
收藏
页码:115 / 131
页数:17
相关论文
共 27 条
[1]  
[Anonymous], P 9 ACM C COMP COMM
[2]  
[Anonymous], P 18 ANN COMP SEC C
[3]  
BATINA L, 2005, P IEEE INT C APPL SP
[4]  
Bellare M, 2004, LECT NOTES COMPUT SC, V3027, P268
[5]   ALGORITHM ENGINEERING FOR PUBLIC KEY ALGORITHMS [J].
BETH, T ;
GOLLMANN, D .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1989, 7 (04) :458-466
[6]  
BLAKE I, 1999, LECT NOTES SERIES
[7]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[8]  
Dodis Y, 2003, LECT NOTES COMPUT SC, V2567, P130
[9]  
JOHNSON D, 2000, 9934 CORR U WAT DEP
[10]  
Joye M, 2002, LECT NOTES COMPUT SC, V2523, P291