摘要 |
<p>This invention presents a method with two protocols that enable security and privacy in any digital communication environment, where Radio Frequency Identification (RFID) is deployed. This is achieved by using cryptographic mechanisms in a so called non-deterministic way that requires very few computational resources (logical gates), which is crucial for RFID environments. The method is based on a shared secret between a reader and RFID tag, where both, the reader and the tag are able to calculate the same strong one-way hash function, concatenation and XOR function. Further, the reader and the tag share another secret that defines an interval for calculation of random values. Authentication is done by sending a challenge from a reader to the tag that is combined with a shared secret in tag's response, which is a random value from the above mentioned interval. This response is checked by the reader, and is of such nature that it is cryptographically strong and protects privacy.</p> |