Skip to main content

Design and Implementation of Crypto Co-processor and Its Application to Security Systems

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3802))

Abstract

In this paper, we will present the design and implementation of the crypto coprocessors which can be used for providing the RFID security. By analyzing the power consumption characteristics of our crypto coprocessors, we can see which crypto algorithms can be used for highly resource constrained applications such as RFID. To provide the security mechanism such as integrity and authentication between the RFID tag and the RFID reader, crypto algorithm or security protocol should be implemented at the RFID tag and reader. Moreover, the security mechanism in the RFID tag should be implemented with low power consumption because the resources of RFID tag are highly constrained, that is, the RFID tag has low computing capability and the security mechanism which operates in the RFID tag should be low power consumed. After investigating the power consumption characteristics of our designed crypto processors, we will conclude which crypto algorithm is suitable for providing the security of RFID systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: CHES, pp. 357–370 (2004)

    Google Scholar 

  2. Juels, A., Rivest, R.L., Szydlo, M.: The blocker tag: selective blocking of RFID tags for consumer privacy. In: Atluri, V., Liu, P. (eds.) Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS 2003), October 27-30, pp. 103–111. ACM Press, New York (2003)

    Chapter  Google Scholar 

  3. Kim, W., Kim, S., Bae, Y., Jun, S., Park, Y., Cho, H.: A platform-based soc design of a 32-bit smart card. ETRI Journal 25(6), 510–516 (2003)

    Article  Google Scholar 

  4. Kang, J.-S., Preneel, B., Ryu, H., Chung, K.I., Park, C.H.: Pseudorandomness of basic structures in the block cipher KASUMI. ETRI Journal 25(2), 89–100 (2003)

    Article  Google Scholar 

  5. Lee, D.H., Chee, S., Hwang, S.C., Ryou, J.-C.: Improved scalar multiplication on elliptic curves defined over F_2mn. ETRI Journal 26(3), 241–251 (2004)

    Article  Google Scholar 

  6. Lee, C., Lee, J.: A scalable structure for a multiplier and an inversion unit in GF(2m). ETRI Journal 25(5), 315–320 (2003)

    Article  Google Scholar 

  7. Stallings, W.: Cryptography and Network Security: Principles and Practice, 3rd edn. Prentice Hall, Upper Saddle River (2003)

    Google Scholar 

  8. Vajda, I.A., An, L.B.: Lightweight authentication protocols for low-cost RFID tags, August 06 (2003)

    Google Scholar 

  9. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: SPC, pp. 201–212 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, H., Lee, MK., Kim, DK., Chung, SK., Chung, K. (2005). Design and Implementation of Crypto Co-processor and Its Application to Security Systems. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_165

Download citation

  • DOI: https://doi.org/10.1007/11596981_165

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30819-5

  • Online ISBN: 978-3-540-31598-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics