Method and apparatus to provide authentication and privacy with low complexity devices
First Claim
Patent Images
1. A method comprising:
- receiving a challenge at a radio frequency identification (RFID) tag from an RFID tag reader;
initializing the RFID tag based upon a first public key of a first key pair, a second public key of a second key pair, and a tag ID n received from the RFID tag reader;
calculating S=f (s, OE), U=f (u, OO), B=E (n, kE), G=f (A, kO), whereA is a function of the challenge and a private key of the RFID tag,s and u are random numbers,kE and ko are functions of the first public key and the second public key, respectively, andOE and OO are originators, provided by the reader; and
returning S, U, B, and G from the RFID tag to the reader, the returned data being unique for each response even when responding to an identical challenge.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus to provide a cryptographic protocol for secure authentication, privacy, and anonymity. The protocol, in one embodiment, is designed to be implemented in a small number of logic gates, executed quickly on simple devices, and provide military grade security.
19 Citations
9 Claims
-
1. A method comprising:
-
receiving a challenge at a radio frequency identification (RFID) tag from an RFID tag reader; initializing the RFID tag based upon a first public key of a first key pair, a second public key of a second key pair, and a tag ID n received from the RFID tag reader; calculating S=f (s, OE), U=f (u, OO), B=E (n, kE), G=f (A, kO), where A is a function of the challenge and a private key of the RFID tag, s and u are random numbers, kE and ko are functions of the first public key and the second public key, respectively, and OE and OO are originators, provided by the reader; and returning S, U, B, and G from the RFID tag to the reader, the returned data being unique for each response even when responding to an identical challenge. - View Dependent Claims (2, 3, 4)
-
-
5. A system comprising:
-
a transceiver configured to transmit and receive data, the transceiver further configured to receive a challenge from a reader system; an initialization module configured to initialize a tag based upon a first public key of a first key pair, a second public key of a second key pair, and a tag ID n received from the reader system; a cryptographic logic module configured to perform cryptographic calculations including calculating S=f (s, OE), U=f (u, OO), B=E (n, kE), G=f (A, kO), where A is a function of the challenge and a private key of a low processing power system (LPPS), s and u are random numbers; n is an identifier of the LPPS, kE and kO are functions of a first public key and a second public key of the reader respectively, and OE and OO are originators, provided by the reader; the transceiver further configured to return S, U, B, and G to the reader system, the returned data being unique for each response even when responding to an identical challenge. - View Dependent Claims (6, 7, 8, 9)
-
Specification