Abstract
This paper presents an overview of modern cryptography. As the title of this paper suggests this paper is a primer, and provides background information that can assist other researchers in further study, and in developing security mechanisms suitable for inclusion on RFID tags.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Oswald, E.: IT security lecture notes. Institute for Applied Information Processing and Communications, Graz University of Technology, Austria (2005)
Grasso A. and Cole P., Definition of Terms Used by the Auto-ID Labs in the Anti- Counterfeiting White Paper Series. Available from http://autoidlabs.eleceng.adelaide.edu.au/static/Definition%20of%20Terms.pdf (7.06.2007)
Stallings, W.: Network and internetwork security: principles and practise. Prentice- Hall, New Jersey (1995)
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. 2nd edn. CRC Press, Boca Raton (1997)
Delfs, H., Knebl, H.: Introduction to Cryptography: Principles and Applications. Springer-Verlag, Berlin, Heidelberg, New York (2002)
Oswald, E.: Introduction to Information Security lecture notes. Institute for Applied Information Processing and Communications, Graz University of Technology, Austria (2004)
Ferguson, N., Schneier, B.: Practical Cryptography. Wiley Publishing, Indianapolis (2003)
Klima, V.: Tunnels in hash functions: MD5 collisions within a minute. In: Cryptology ePrint Archive. Available from: http://eprint.iacr.org/2006/ 105.pdf (4.05.2006)
Schneier, B.: New cryptanalytic results against SHA-1. In: Weblog: Schneier on Security (2005). Available from: http://www.schneier.com/blog/archives/2005/08/ new_cryptanalyt. html (4.05.2006)
Goldreich, O: Foundations of Cryptography: Basic Tools. Cambridge University Press, Cambridge (2001)
Ranasinghe, D., Lim, D., Devadas, S., Abbott, D., Cole, P.: Random numbers from metastability and thermal noise. In: IEE Electronic Letters, Vol. 41, Iss. 16 (2005) 13–14
Grimaldi, R.P.: Discrete and Combinatorial Mathematics: An Applied Introduction. 4th ed. (1998) 244–248
AES Lounge: AES security. Available from: http://www.iaik.tu-graz.ac.at/research/krypto/AES/index.php#security (6.03.2006)
RSA Laboratories: What is a linear feedback shift register? Available from: http://www.rsasecurity.com/rsalabs/node.asp?id=2175 (4.04.2006)
RSA Laboratories: What is a stream cipher? Available from: http://www.rsasecurity.com/rsalabs/node.asp?id=2174 (4.04.2006)
Fluhrer, S.R., McGrew, D.A.: Statistical analysis of the alleged RC4 keystream generator. In FSE (2000) 19–30
RSA Laboratories: What are Message Authentication Codes? Available from: http://www.rsasecurity.com/rsalabs/node.asp?id=2177 (4.04.2006)
Chang, S., Eberle, H., Gupta, V., Gura, N.: Elliptic curve cryptography – how it works. Sun Microsystems Laboratories (2004). Available from: http://research.sun.com/projects/crypto/ (9.04.2006)
Gura, N., Shantz, S., Eberle, H., et al.: An end-to end systems approach to elliptic curve cryptography. Sun Microsystems Laboratories (2002). Available from: http://research.sun.com/projects/crypto (9.04.2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Jantscher, M., Ghosal, R., Grasso, A., Cole, P. (2008). A Security Primer. In: Cole, P., Ranasinghe, D. (eds) Networked RFID Systems and Lightweight Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71641-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-540-71641-9_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71640-2
Online ISBN: 978-3-540-71641-9
eBook Packages: Computer ScienceComputer Science (R0)