Implementing high-level Counterfeit Security using RFID and PKI

Conference: RFID SysTech 2007 - 3rd European Workshop on RFID Systems and Technologies
06/12/2007 - 06/13/2007 at Duisburg, Germany

Proceedings: RFID SysTech 2007

Pages: 5Language: englishTyp: PDF

Personal VDE Members are entitled to a 10% discount on this title

Wallstabe, Andreas; Pohl, Hartmut (Information Security, Department of Computer Science, University of Applied Sciences Bonn-Rhein-Sieg, St. Augustin Germany)

Radio Frequency Identification (RFID) systems have become popular mostly for automated identification and supply chain applications. To implement counterfeit security, RFID- and Public Key (PK) technology are combined. RFID tags authenticate themselves by responding to a challenge of a reader/writer device. For this an asymmetric encryption algorithm (RSA) is implemented and executed on the tag. Thereby a high level of counterfeit security is reached. Using a private/public key pair makes this method very flexible for validation by the distributor or the customer. The asymmetric encryption algorithm is running on a low cost tag providing security even for products with a low value. For high level security, drugs are used as example products.