ETRI-Knowledge Sharing Plaform

ENGLISH

성과물

논문 검색
구분 SCI
연도 ~ 키워드

상세정보

학술대회 Design and Implementation of Crypto Co-processor and Its Application to Security Systems
Cited 1 time in scopus Download 0 time Share share facebook twitter linkedin kakaostory
저자
김호원, 이문규, 김동규, 정상균, 정교일
발행일
200512
출처
International Conference on Computational and Information Science (CIS) 2005 (LNCS 3802), v.3802, pp.1104-1109
DOI
https://dx.doi.org/10.1007/11596981_165
협약과제
05MK2500, 차세대 시큐리티 기술 개발, 조현숙
초록
In this paper, we will present the design and implementation of the crypto coprocessors which can be used for providing the RFID security. By analyzing the power consumption characteristics of our crypto coprocessors, we can see which crypto algorithms can be used for highly resource constrained applications such as RFID. To provide the security mechanism such as integrity and authentication between the RFID tag and the RFID reader, crypto algorithm or security protocol should be implemented at the RFID tag and reader. Moreover, the security mechanism in the RFID tag should be implemented with low power consumption because the resources of RFID tag are highly constrained, that is, the RFID tag has low computing capability and the security mechanism which operates in the RFID tag should be low power consumed. After investigating the power consumption characteristics of our designed crypto processors, we will conclude which crypto algorithm is suitable for providing the security of RFID systems. © Springer-Verlag Berlin Heidelberg 2005.
KSP 제안 키워드
Crypto Processor, Crypto algorithm, RFID Tag, RFID reader, RFID security, RFID system, Resource-constrained, co-processor, design and implementation, low power consumption, security mechanism