Skip to main content
  • 1417 Accesses

Abstract

This paper presents an overview of modern cryptography. As the title of this paper suggests this paper is a primer, and provides background information that can assist other researchers in further study, and in developing security mechanisms suitable for inclusion on RFID tags.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Oswald, E.: IT security lecture notes. Institute for Applied Information Processing and Communications, Graz University of Technology, Austria (2005)

    Google Scholar 

  2. Grasso A. and Cole P., Definition of Terms Used by the Auto-ID Labs in the Anti- Counterfeiting White Paper Series. Available from http://autoidlabs.eleceng.adelaide.edu.au/static/Definition%20of%20Terms.pdf (7.06.2007)

    Google Scholar 

  3. Stallings, W.: Network and internetwork security: principles and practise. Prentice- Hall, New Jersey (1995)

    Google Scholar 

  4. Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. 2nd edn. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  5. Delfs, H., Knebl, H.: Introduction to Cryptography: Principles and Applications. Springer-Verlag, Berlin, Heidelberg, New York (2002)

    MATH  Google Scholar 

  6. Oswald, E.: Introduction to Information Security lecture notes. Institute for Applied Information Processing and Communications, Graz University of Technology, Austria (2004)

    Google Scholar 

  7. Ferguson, N., Schneier, B.: Practical Cryptography. Wiley Publishing, Indianapolis (2003)

    Google Scholar 

  8. Klima, V.: Tunnels in hash functions: MD5 collisions within a minute. In: Cryptology ePrint Archive. Available from: http://eprint.iacr.org/2006/ 105.pdf (4.05.2006)

    Google Scholar 

  9. Schneier, B.: New cryptanalytic results against SHA-1. In: Weblog: Schneier on Security (2005). Available from: http://www.schneier.com/blog/archives/2005/08/ new_cryptanalyt. html (4.05.2006)

    Google Scholar 

  10. Goldreich, O: Foundations of Cryptography: Basic Tools. Cambridge University Press, Cambridge (2001)

    Book  MATH  Google Scholar 

  11. Ranasinghe, D., Lim, D., Devadas, S., Abbott, D., Cole, P.: Random numbers from metastability and thermal noise. In: IEE Electronic Letters, Vol. 41, Iss. 16 (2005) 13–14

    Article  Google Scholar 

  12. Grimaldi, R.P.: Discrete and Combinatorial Mathematics: An Applied Introduction. 4th ed. (1998) 244–248

    Google Scholar 

  13. AES Lounge: AES security. Available from: http://www.iaik.tu-graz.ac.at/research/krypto/AES/index.php#security (6.03.2006)

    Google Scholar 

  14. RSA Laboratories: What is a linear feedback shift register? Available from: http://www.rsasecurity.com/rsalabs/node.asp?id=2175 (4.04.2006)

    Google Scholar 

  15. RSA Laboratories: What is a stream cipher? Available from: http://www.rsasecurity.com/rsalabs/node.asp?id=2174 (4.04.2006)

    Google Scholar 

  16. Fluhrer, S.R., McGrew, D.A.: Statistical analysis of the alleged RC4 keystream generator. In FSE (2000) 19–30

    Google Scholar 

  17. RSA Laboratories: What are Message Authentication Codes? Available from: http://www.rsasecurity.com/rsalabs/node.asp?id=2177 (4.04.2006)

    Google Scholar 

  18. Chang, S., Eberle, H., Gupta, V., Gura, N.: Elliptic curve cryptography – how it works. Sun Microsystems Laboratories (2004). Available from: http://research.sun.com/projects/crypto/ (9.04.2006)

    Google Scholar 

  19. Gura, N., Shantz, S., Eberle, H., et al.: An end-to end systems approach to elliptic curve cryptography. Sun Microsystems Laboratories (2002). Available from: http://research.sun.com/projects/crypto (9.04.2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Jantscher, M., Ghosal, R., Grasso, A., Cole, P. (2008). A Security Primer. In: Cole, P., Ranasinghe, D. (eds) Networked RFID Systems and Lightweight Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71641-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71641-9_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71640-2

  • Online ISBN: 978-3-540-71641-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics