RFID-Tags for Anti-counterfeiting
RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. This chip functionality makes it possible to verify the authenticity of a product and hence to detect and prevent counterfeiting. In order to be successful for these security purposes too, RFID-tags have to be resistant against many attacks, in particular against cloning of the tag. In this paper, we investigate how an RFID-tag can be made unclonable by linking it inseparably to a Physical Unclonable Function (PUF). We present the security protocols that are needed for the detection of the authenticity of a product when it is equipped with such a system. We focus on off-line authentication because it is very attractive from a practical point of view. We show that a PUF based solution for RFID-tags is feasible in the off-line case.
KeywordsRFID counterfeiting authentication ECC Physical Unclonable Function (PUF)
Unable to display preview. Download preview PDF.
- 1.Weis, S.A., Juels, A.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293–308. Springer, Heidelberg (2005)Google Scholar
- 2.Batina, L., Mentens, N., Preneel, B., Verbauwhede, I.: Side-channel aware design: Algorithms and architectures for elliptic curve cryptography over GF(2n). In: Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP 2005), Samos, Greece, July 23-15. IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
- 8.Gassend, B., et al.: Silicon physical unknown functions. In: Proc. 9th ACM Conference on Computer and Communications Security (November 2002)Google Scholar
- 9.Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Controlled physical random functions. In: Proceedings of the 18th Annual Computer Security Conference (December 2002)Google Scholar
- 10.Johnson, D., Menezes, A.: The elliptic curve digital signature algorithm (ECDSA). Technical Report CORR 99-34, Department of Combinatorics & Optimization, University of Waterloo, Canada (February 24, 2000), http://www.cacr.math.uwaterloo.ca
- 12.Juels, A.: Strengthening EPC Tags against Cloning (March 2005) (manuscript)Google Scholar
- 18.Neve, M., Peeters, E., Samyde, D., Quisquater, J.-J.: Memories: a Survey of their Secure Uses in Smart Cards. In: 2nd International IEEE Security In Storage Workshop (IEEE SISW 2003), Washington DC, USA, pp. 62–72 (2003)Google Scholar
- 19.Skoric, B., Tuyls, P.: Secret key generation from classical physics, September 2005. Philips Research Book Series (2005)Google Scholar
- 26.van Dijk, M., Tuyls, P.: Robustness, reliability and security of biometric key distillation in the information theoretic setting. In: Cerf, N., Cardinal, J. (eds.) Proceedings of the 26th Benelux Symposium on Information Theory. Proceedings of the WIC, vol. 26 (2005)Google Scholar
- 27.Wolkerstorfer, J.: Scaling ECC Hardware to a Minimum. In: ECRYPT workshop - Cryptographic Advances in Secure Hardware - CRASH 2005 (September 6-7, 2005) (invited talk)Google Scholar