53 research outputs found

    セキュアRFIDタグチップの設計論

    Get PDF
    In this thesis, we focus on radio frequency identification (RFID) tag. We design, implement, and evaluate hardware performance of a secure tag that runs the authentication protocol based on cryptographic algorithms. The cryptographic algorithm and the pseudorandom number generator are required to be implemented in the tag. To realize the secure tag, we tackle the following four steps: (A) decision of hardware architecture for the authentication protocol, (B) selection of the cryptographic algorithm, (C) establishment of a pseudorandom number generating method, and (D) implementation and performance evaluation of a silicon chip on an RFID system.(A) The cryptographic algorithm and the pseudorandom number generator are repeatedly called for each authentication. Therefore, the impact of the time needed for the cryptographic processes on the hardware performance of the tag can be large. While low-area requirements have been mainly discussed in the previous studies, it is needed to discuss the hardware architecture for the authentication protocol from the viewpoint of the operating time. In this thesis, in order to decide the hardware architecture, we evaluate hardware performance in the sense of the operating time. As a result, the parallel architecture is suitable for hash functions that are widely used for tag authentication protocols.(B) A lot of cryptographic algorithms have been developed and hardware performance of the algorithms have been evaluated on different conditions. However, as the evaluation results depend on the conditions, it is hard to compare the previous results. In addition, the interface of the cryptographic circuits has not been paid attention. In this thesis, in order to select a cryptographic algorithm, we design the interface of the cryptographic circuits to meet with the tag, and evaluate hardware performance of the circuits on the same condition. As a result, the lightweight hash function SPONGENT-160 achieves well-balanced hardware performance.(C) Implementation of a pseudorandom number generator based on the performance evaluation results on (B) can be a method to generate pseudorandom number on the tag. On the other hand, as the cryptographic algorithm and the pseudorandom number generator are not used simultaneously on the authentication protocol. Therefore, if the cryptographic circuit could be used for pseudorandom number generation, the hardware resource on the tag can be exploited efficiently. In this thesis, we propose a pseudorandom number generating method using a hash function that is a cryptographic component of the authentication protocol. Through the evaluation of our proposed method, we establish a lightweight pseudorandom number generating method for the tag.(D) Tag authentication protocols using a cryptographic algorithm have been developed in the previous studies. However, hardware implementation and performance evaluation of a tag, which runs authentication processes, have not been studied. In this thesis, we design and do a single chip implementation of an analog front-end block and a digital processing block including the results on (A), (B), and (C). Then, we evaluate hardware performance of the tag. As a result, we show that a tag, which runs the authentication protocol based on cryptographic algorithms, is feasible.電気通信大学201

    RFID LOGIN SYSTEM For COMPUTERS

    Get PDF
    This report covers the implementation of RFID Login System for computers. The objective of this project is to replace the existing smart card used to login to a computer, with RFID technology. RFID technology is identified as the best alternative for smart card, due to its high level of security. The project scope is to fabricate RFID tag and reader for computer login. The transponder will transmit the signal containing user's information upon activation and the reader will process the information for verification purposes. The scope of the study is mainly about the architecture of RFID and how to develop hardware related to RFID. A prototype mainly consists of microcontroller application, radio frequency data transmission circuitry and graphical user interface was successfully developed. The prototype can be effectively used for computer login, based on RFID technology.

    A Low-Power Passive UHF Tag With High-Precision Temperature Sensor for Human Body Application

    Get PDF
    Radio frequency identification (RFID) tags are widely used in various electronic devices due to their low cost, simple structure, and convenient data reading. This topic aims to study the key technologies of ultra-high frequency (UHF) RFID tags and high-precision temperature sensors, and how to reduce the power consumption of the temperature sensor and the overall circuits while maintaining minimal loss of performance. Combined with the biomedicine, an innovative high-precision human UHF RFID chip for body temperature monitoring is designed. In this study, a ring oscillator whose output frequency is linearly related to temperature is designed and proposed as a temperature-sensing circuit by innovatively combining auxiliary calibration technology. Then, a binary counter is used to count the pulses, and the temperature is ultimately calculated. This topic designed a relaxation oscillator independent of voltage and current. The various types of resistors were used to offset the temperature deviation. A current mirror array calibration circuit is used to calibrate the process corner deviation of the clock circuit with a self-calibration algorithm. This study mainly contributes to reducing power consumption and improving accuracy. The total power consumption of the RF/analog front-end and temperature sensor is 7.65µW. The measurement error of the temperature sensor in the range of 0 to 60◦C is less than ±0.1%, and the accuracy of the output frequency of the clock circuit is ±2.5%

    PERFORMANCE ANALYSIS OF SECURITY MEASURES IN NEAR FIELD COMMUNICATION

    Get PDF
    Nowadays near field communication are largely used in so many different applications for the convenience and ease of use they provide. They store and exchange many personal data, some of them requires more security than others, due to the value they poses, such as banking information and personal identification. And maintaining high level of security is task of the utmost priority. The main focus of this thesis is establishing a knowledge base for different NFC/RFID devices. Evaluating the different encryption algorithms used currently, based on their encryption/decryption time, their immunity to brute force attack, and the amount of power needed to execute them. The encryption algorithms will be implemented using Python programing language and tested on a windows computer in order to test their immunity against brute force attack. Encryption/decryption time and the power usage will be tested on a Raspberry Pi, for the similarities it has with modern mobile devices.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    Potential of RFID technology in logistics - Case Metso Paper -

    Get PDF
    Viime vuosina palveluliiketoiminnan merkitys ydinosaamista tukevana prosessina on kasvanut merkittävästi. Metso Paperin ydinosaamista on paperikoneiden valmistus mutta Service liiketoimintaan panostetaan vahvasti ja siltä odotetaan kasvua. Tällä osa-alueella logistiikalla ja etenkin materiaalin tunnistamisella on iso vaikutus prosessien tehokkuuteen. Viivakoodi on yleisesti ollut hallitseva automaattisen tunnistamisen menetelmä mutta sillä on omat rajoituksensa. RFID:llä nämä rajoitukset voidaan voittaa. Standardisoinnin sekä teknisen kehityksen ansiosta se on nopeasti noussut vaihtoehtoiseksi menetelmäksi tehostaa logistiikkaa. Siksi Metso Paper Service on nähnyt RFID tutkimuksen tarpeelliseksi. Tämän Pro Gradu tutkimuksen tarkoitus on selvittää voidaanko RFID:llä tehostaa Metso Paper Servicen nimettyjä prosesseja. Tavoitteena on tunnistaa ne prosessit joissa RFID:llä voitaisiin saavuttaa liiketoiminnallisia parannuksia ja kustannussäästöjä nykyiseen toimintamalliin verrattuna. Tutkimus on toteutettu haastattelemalla avainhenkilöitä teema kysymyksillä 8:sta toimeksiantajan nimeämästä prosessista. Haastattelun ja tilastollisen aineiston perusteella nykyiset toimintamallit ja materiaalin tunnistamiseen liittyvät oleelliset asiat on kuvattu prosessikarttoineen. Lisäksi teoriaosa esittelee RFID tekniikan pääosin tasolla, jonka käyttäjän on hyvä tietää. Tältä pohjalta on analysoitu pystytäänkö RFID:n avulla tehostamaan prosessin toimintaa. Tutkimuksessa havaittiin että useampi prosessi kehittyisi jollakin tavalla RFID:stä mutta toteutettavuus ja saavutettavan hyödyn määrä vaihtelevat. Kuitenkin yksi prosessi muodostui muita selvästi sopivammaksi. Tutkimuksen viimeisessä osassa on selvitetty RFID:n tarkemmat toiminnalliset sekä taloudelliset vaikutukset tähän prosessiin, niin tarkasti kuin se etukäteen on mahdollista. Lopputuloksena päädyttiin suosittelemaan RFID pilottiprojektia suomalaisten asiakkaiden kanssa.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    Lightweight Cryptography for Passive RFID Tags

    Get PDF

    Automated Attendance System using Active RFID

    Get PDF
    The main focus ofthis project is to enhance the integrity and the authenticity ofdata, whereby, conventional system couldn't ensure the safety of the data. As the result, many employees neglect the importance of attitude in working environment. This project offers a safety towards the data, and in the same time helping in monitoring the movement of employees. Given a number of time, this project will undergo several phases which are planning, analysis, design and implementation. Lastly, the success ofthis project will be determined, and a conclusion should be made based on the result obtained, whether the objective has been met or not

    Sensor-based management systems based on RFID technology

    Get PDF
    Παρατηρήσεις έκδοσης: λείπουν οι σελίδες 78, 102 από το φυσικό τεκμήριο.In this diploma thesis, the RFID technology is analyzed (operating principles, readers' and tags hardware, coding, modulation, anticollision procedures, frequencies, standards, applications). Moreover, a protocol to synchronize readers working in a multi-reader multi-tag environment is proposed. The protocol is applied to the store shelf scanning application and further refined to meet the requirements of this specific application

    Low-power CMOS rectifier and Chien search design for RFID tags

    Get PDF
    Automotive sensors implemented in radio frequency identification (RFID) tags can correct data errors by using BCH (Bose-Chaudhuri-Hocquenghem) decoder, for which Chien search is a computation-intensive key step. Existing low power approaches have drastically degrading performance for multiple-bit-correcting codes. This thesis presents a novel approach of using register-transfer-level (RTL) power management in the search process, leading to significant power savings for BCH codes with higher correction capability. An example for the (255, 187, 9) BCH code has been implemented in 0.18μm CMOS technology. We also consider ways of conserving power for the sole power harvester on a passive tag – the rectifier. With ST CMOS 90nm technology, a three-stage differential-drive CMOS rectifier is designed by using a new transistor scaling method and a piece-wise linear matching technique. For the standard 915MHz band, simulation indicates high power conversion efficiency (PCE) of 74% and a significantly increased output power of 30.3μW at 10 meters

    Lightweight symmetric cryptography

    Full text link
    The Internet of Things is one of the principal trends in information technology nowadays. The main idea behind this concept is that devices communicate autonomously with each other over the Internet. Some of these devices have extremely limited resources, such as power and energy, available time for computations, amount of silicon to produce the chip, computational power, etc. Classical cryptographic primitives are often infeasible for such constrained devices. The goal of lightweight cryptography is to introduce cryptographic solutions with reduced resource consumption, but with a sufficient security level. Although this research area was of great interest to academia during the last years and a large number of proposals for lightweight cryptographic primitives have been introduced, almost none of them are used in real-word. Probably one of the reasons is that, for academia, lightweight usually meant to design cryptographic primitives such that they require minimal resources among all existing solutions. This exciting research problem became an important driver which allowed the academic community to better understand many cryptographic design concepts and to develop new attacks. However, this criterion does not seem to be the most important one for industry, where lightweight may be considered as "rightweight". In other words, a given cryptographic solution just has to fit the constraints of the specific use cases rather than to be the smallest. Unfortunately, academic researchers tended to neglect vital properties of the particular types of devices, into which they intended to apply their primitives. That is, often solutions were proposed where the usage of some resources was reduced to a minimum. However, this was achieved by introducing new costs which were not appropriately taken into account or in such a way that the reduction of costs also led to a decrease in the security level. Hence, there is a clear gap between academia and industry in understanding what lightweight cryptography is. In this work, we are trying to fill some of these gaps. We carefully investigate a broad number of existing lightweight cryptographic primitives proposed by academia including authentication protocols, stream ciphers, and block ciphers and evaluate their applicability for real-world scenarios. We then look at how individual components of design of the primitives influence their cost and summarize the steps to be taken into account when designing primitives for concrete cost optimization, more precisely - for low energy consumption. Next, we propose new implementation techniques for existing designs making them more efficient or smaller in hardware without the necessity to pay any additional costs. After that, we introduce a new stream cipher design philosophy which enables secure stream ciphers with smaller area size than ever before and, at the same time, considerably higher throughput compared to any other encryption schemes of similar hardware cost. To demonstrate the feasibility of our findings we propose two ciphers with the smallest area size so far, namely Sprout and Plantlet, and the most energy efficient encryption scheme called Trivium-2. Finally, this thesis solves a concrete industrial problem. Based on standardized cryptographic solutions, we design an end-to-end data-protection scheme for low power networks. This scheme was deployed on the water distribution network in the City of Antibes, France
    corecore