Security Protocol Based on Random Key Generation for an Rfid System
Total Page:16
File Type:pdf, Size:1020Kb
UNLV Retrospective Theses & Dissertations 1-1-2006 Security protocol based on random key generation for an Rfid system Karthik Raghavan University of Nevada, Las Vegas Follow this and additional works at: https://digitalscholarship.unlv.edu/rtds Repository Citation Raghavan, Karthik, "Security protocol based on random key generation for an Rfid system" (2006). UNLV Retrospective Theses & Dissertations. 2069. http://dx.doi.org/10.25669/5uc7-1zn4 This Thesis is protected by copyright and/or related rights. It has been brought to you by Digital Scholarship@UNLV with permission from the rights-holder(s). You are free to use this Thesis in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s) directly, unless additional rights are indicated by a Creative Commons license in the record and/ or on the work itself. This Thesis has been accepted for inclusion in UNLV Retrospective Theses & Dissertations by an authorized administrator of Digital Scholarship@UNLV. For more information, please contact [email protected]. SECURITY PROTOCOL BASED ON RANDOM KEY GENERATION FOR AN RFID SYSTEM by Karthik Raghavan Bachelor of Engineering, Computer Science University of Madras, India 2003 A thesis submitted in partial fulfillment of the requirements for the Master of Science Degree in Computer Science School of Computer Science Howard R. Hughes College of Engineering Graduate College University of Nevada, Las Vegas December 2006 Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. UMI Number: 1441726 INFORMATION TO USERS The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleed-through, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. UMI UMI Microform 1441726 Copyright 2007 by ProQuest Information and Learning Company. All rights reserved. This microform edition is protected against unauthorized copying under Title 17, United States Code. ProQuest Information and Learning Company 300 North Zeeb Road P.O. Box 1346 Ann Arbor, Ml 48106-1346 Reproduced witfi permission of tfie copyrigfit owner. Furtfier reproduction profiibited witfiout permission. Thesis Approval The Graduate College University of Nevada, Las Vegas JANUARY 4TH_________.2 0 07 The Thesis prepared by KARTHIK RAGHAVAN Entitled SECURITY PROTOCOL BASED ON RANDOM KEY GENERATION FOR AN RFID SYSTEM is approved in partial fulfillment of the requirements for the degree of _____________________MASTER OF SCIENCE IN COMPUTER SCIENCE Examination Committee Chair Dean of the Graduate Gollege Examination Committee Member Examination Committee Member ---------- Graduate College^jtculty Representative 11 Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. ABSTRACT Security protocol based on random key generation for an RFID system by Karthik Raghavan Dr. Yoohwan Kim, Examination Committee Chair Assistant Professor of Computer Science University of Nevada, Las Vegas Radio Frequency Identification (RFID) is a technology, which describes the transmission of unique information by a wireless device, over Radio waves, when prompted or read by a compatible reader. The basic components in implementing RFID are RFID tags which are small microchips attached to a radio antenna, mounted on a substrate, and a wireless transceiver/reader that queries the RFID tags. This thesis deals with research issues related to security aspects in the communication between an RFID tag and its reader. More precisely, it deals with a new, simple and efficient security protocol based on an encryption that uses the concept of regular public key regeneration, which can be effortlessly adopted in an RFID application. in Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. TABLE OE CONTENTS ABSTRACT....................................................................... iii LIST CE TA B LES..............................................................................................................................vi LIST OF EIGURES.......................................................................................................................... vii ACKNOWLEDGEMENT............................................................................................................. viii CHAPTER I INTRODUCTION ..............................................................................................I 1.1 History of R F ID .............................................................................................3 1.2 How it Works ................................................................................................. 3 1.3 Security Issues in RFID Systems .............................................................. 5 CHAPTER 2 RFID SECURITY LITERATURE REVIEW .....................................7 2.1 RFID Application Study ............................................................................ 8 2.2 Security Issues ........................................ 9 2.2.1 Sniffing ..............................................................................................9 2.2.2 Tracking ............................................................................................ 9 2.2.3 Spoofing ...........................................................................................10 2.2.4 Replay Attacks ...............................................................................10 2.2.5 Denial of Service ........................................................................... 10 2.3 Existing Security Mechanisms and Protocols ..................................... II 2.3.1 Challenge-Response System .......................................................11 2.3.2 Encryption ....................................................................................... 12 2.3.3 Hash Function ................................................................................ 13 2.3.4 Simple Approaches .......................................................................13 CHAPTER 3 SECURITY PROTOCOL DEFINITION AND IMPLEMENTATION................................................................. 15 3.1 Why does RFID Communication need Security? ...............................16 3.2 Custom RFID System Description ........................................................17 3.2.1 RFID Reader................. 17 3.2.2 RFID Tag ........................................................................................ 18 3.3.3 RFID Tag Description ..................................................................20 3.3.4 RFID System’s Backend Application ...................................... 21 3.3 RFID Security Implementation based on Protocol ............................22 3.3.1 Security Implementation in Physical Layer ............................24 3.3.2 Security Implementation in Data Link Layer ........................ 25 3.3.2.1 Boolean Encryption .........................................................26 3.3.2.2 Tiny Encryption Algorithm ............................................26 IV Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. 3.3.2.3 Advanced Encryption Standard ..................................28 3.3.3 RFID System Data Packet Format ..........................................31 3.4 Protocol Irnplementation ................... 32 CHAPTER 4 RFID SECURITY PROTOCOL SIMULATOR ............................37 4.1 Simulator’s Main Window ...................................................................... 38 4.2 Simulator W indow .................................................................................... 40 4.3 Options Window .................................................................................... 41 4.4 View Results Window ............................................................................. 44 CHAPTER 5 SECURITY PROTOCOL ANALYSIS........................................... 47 5.1 Security Analysis against Attacks ................. 48 5 .1.1 Eavesdropping ............................................................................... 48 5.1.2 Man-in-the-middle....................................................................... 49 5.1.3 Replay Attack .................................................................................51 5.1.4 Data Loss/ Denial-of-service ..................................................... 52 5.1.5 Forgery ............................................................................................ 53 5.1.6 Physical Attack ............................................................................. 53 5.2 Encryption Implementation Analysis ...................................................54 5.2.1 Boolean Encryption/Decryption ............................................... 55 5.2.2 TEA Encryption/Decryption ...................................................... 57 5.2.3 AES Encryption/Decryption ...................................................... 59 CHAPTER 6 CONCLUSION AND FUTURE WORK ...................................................62 BIBLIOGRAPHY..............................................................................................................................63