Home // ICWMC 2023, The Nineteenth International Conference on Wireless and Mobile Communications // View article


Secure-by-Design Methodology using Meet-in-the-Middle Design Flow for Hardware Implementations of ECC-based Passive RFID Tags

Authors:
Manh-Hiep Dao
Vincent Beroulle
Yann Kieffer
Xuan-Tu Tran

Keywords: Passive RFID, Side-Channel Attacks, Design Methodology, Security by Design, ECC, Meet-in-the-Middle.

Abstract:
With the rapid development of needs concerning the secured passive Radio Frequency IDentification (RFID) tag, several works propose the implementation of authentication protocols based on Elliptic Curve Cryptography (ECC). But, there are no systematical approaches that allow considering both the compatibility of security and the implementation cost as part of the requirements and limitations of passive RFID tags. Therefore, the problem of balancing the implementation cost and the security requirements for passive RFID tags is still an open question. In this paper, we present a part of a Security-by-Design methodology that targets passive RFID tags using ECC primitives.

Pages: 14 to 19

Copyright: Copyright (c) IARIA, 2023

Publication date: March 13, 2023

Published in: conference

ISSN: 2308-4219

ISBN: 978-1-68558-060-5

Location: Barcelona, Spain

Dates: from March 13, 2023 to March 17, 2023