• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

RFID Authenticated Encryption Scheme of Multi-entity by Elliptic Curve's Coordinates


Sung-Jin Kim, Seok-Cheon Park, Journal of Internet Computing and Services, Vol. 9, No. 3, pp. 43-50, Jun. 2008
Full Text:
Keywords: RFID, Elliptic Curves, Encryption, Security, ECNR, authentication

Abstract

Authenticated Encryption scheme in RFID system is the important issue for ID security. But, implementing authenticated Encryption scheme in RFID systems is not an easy proposition and systems are often delivered for reasons of complexity, limited resources, or implementation, fail to deliver required levels of security. RFID system is so frequently limited by memory, performance (or required number of gates) and by power drain, that lower levels of security are installed than required to protect the information. In this paper, we design a new authenticated encryption scheme based on the EC(Elliptic Curve)'s x-coordinates and scalar operation. Our scheme will be offers enhanced security feature in RFID system with respect to user privacy against illegal attack allowing a ECC point addition and doubling operation.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Sung-Jin Kim and Seok-Cheon Park (2008). RFID Authenticated Encryption Scheme of Multi-entity by Elliptic Curve's Coordinates. Journal of Internet Computing and Services, 9(3), 43-50.

[IEEE Style]
S. Kim and S. Park, "RFID Authenticated Encryption Scheme of Multi-entity by Elliptic Curve's Coordinates," Journal of Internet Computing and Services, vol. 9, no. 3, pp. 43-50, 2008.

[ACM Style]
Sung-Jin Kim and Seok-Cheon Park. 2008. RFID Authenticated Encryption Scheme of Multi-entity by Elliptic Curve's Coordinates. Journal of Internet Computing and Services, 9, 3, (2008), 43-50.