Most RFID Tough to Crack

S. K.
September 2006
Bank Technology News;Sep2006 Supplement, Vol. 19, p14
Trade Publication
The article focuses on the importance of radio frequency identification systems (RFID) to secure credit cards in the U.S. It has cited that a highly secure platform can be ensured by simply putting encryption in the card, having a strong protocol between the RFID and credit card. RFID readers and middleware would have to collect raw RFID data and be authorized on the network.


Related Articles

  • A Combined Approach of Elliptic Curve and Zero Knowledge Based Forward Secure Protocol. Sandhya, M.; Rangaswamy, T. R. // World Academy of Science, Engineering & Technology;Aug2009, Issue 32, p847 

    Radio frequency identification (RFID) is an important part in mobile and ubiquitous domain, and brings enormous productivity benefits in applications where objects require automatic identification. However, this pervasive use of RFID tags opens up the possibility of various attacks that violate...

  • A New Ultralightweight RFID Mutual Authentication Protocol: SASI Using Recursive Hash. Mujahid, Umar; Najam-ul-Islam, M.; Jafri, Atif Raza; Qurat-ul-Ain; Ali Shami, M. // International Journal of Distributed Sensor Networks;2/21/2016, p1 

    RFID is one of the most prominent identification schemes in the field of pervasive systems. Nonline of sight capability makes RFID systems much better choice than its contended systems (such as barcode, magnetic tape, etc.). Since the RFID uses wireless channel for communication with its...

  • A Novel Mutual RFID Authentication Protocol with Low Complexity and High Security. Rostampour, Samad; Namin, Mojtaba Eslamnezhad; Hosseinzadeh, Mehdi // International Journal of Modern Education & Computer Science;Feb2014, Vol. 6 Issue 2, p1 

    Radio Frequency Identification (RFID) is a method for automated identifying objects. One of the problems of this technology is its security. RFID tags include resource limitation; therefore, the system designers cannot implement complex circuits to enhance their security. Usually the symmetric...

  • Chaos Encryption Algorithm to Deal with Security Threat to Internet of Things RFID. Tian Xiaoyong // Journal of Networks;May2013, Vol. 8 Issue 5, p1168 

    Internet of Things RFID system is mainly studied problem in current communication area, where the safety of code message become rather important. Chaos encryption algorithm can disperse not only the time area but the scale, which is suitable for computer to deal with and overcome the limitation...

  • Real Time Related Key Attack on Hummingbird-2. Kai Zhang; Lin Ding; Junzhi Li; Jie Guan // KSII Transactions on Internet & Information Systems;Aug2012, Vol. 6 Issue 8, p1946 

    Hummingbird is a lightweight encryption and message authentication primitive published in RISC'09 and WLC'10. In FSE'11, Markku-Juhani O.Saarinen presented a differential divide-and-conquer method which has complexity upper bounded by 264 operations and requires processing of few megabytes of...

  • Proactive Threshold Cryptosystem for EPC Tags. GARCIA-ALFARO, J.; BARBEAU, M.; KRANAKIS, E. // Adhoc & Sensor Wireless Networks;2011, Vol. 12 Issue 3/4, p187 

    No abstract available.

  • Tin foils RFID thieves. Kren, Lawrence // Machine Design;3/3/2005, Vol. 77 Issue 5, p48 

    Discusses the security vulnerability of the encryption key in car-immobilizer ignition keys and wireless-payment tags. Mechanism of a passive transponder chip in the key; Ways of gathering signals from a target DST; Use of 128-bit Advanced Encryption Standard (AES) keys in combating attackers...

  • Security in the Cloud. Traub, Ken // RFID Journal;Sep/Oct2014, p1 

    The article offers tips for protecting radio-frequency identification (RFID) applications from hackers. Suggestions discussed include using Hypertext Transfer Protocol Secure (HTTPS) and configuring each reader with a password to secure communication protocol between a reader and the cloud,...

  • Review: Security Threats for RFID-Sensor Network Anti-Collision Protocol. Balitanas, Maricel O.; Kim, Taihoon // International Journal of Smart Home;Jan2010, Vol. 4 Issue 1, p23 

    The limitless possibilities and low cost are the reasons Radio Frequency Identification (RFID) systems are used in a variety of applications to uniquely identify physical objects. The operation of RFID systems often involves a situation in which numerous tags are present in the interrogation...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics