cryptography in rfid and its applications in china · authentication and data integrity rf...

30
Cryptography in RFID and Its Applications in China Jiansuo Zhou CEC Huada Electronic Design Co., Ltd. RFID Crypto Workgroup Oct. 24, 2012

Upload: others

Post on 19-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

Cryptography in RFID and Its

Applications in China

Jiansuo Zhou

CEC Huada Electronic Design Co., Ltd.

RFID Crypto Workgroup

Oct. 24, 2012

Page 2: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

Are you using RFID?

Is it secure?

Do you want to use secure RFID?

Page 3: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

Contents

RFID system and security

Why crypto in RFID is needed in China?

RFID crypto standard system

RFID crypto applications

Introduction to RFID crypto workgroup

Page 4: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

Contents

RFID system and security

Why crypto in RFID is needed in China?

RFID crypto standard system

RFID crypto applications

Introduction to RFID crypto workgroup

Page 5: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

ISO18000

-2: 125~135KHz

-3:13.56MHz

-4: 2.45GHz

-5: 5.8GHz

-6:860-960MHz

-7: 433.92MHz

ISO14443

RFID system and security

RFID Applications Asset management

Item tracking

Authenticity verification

Access control

Supply chain management

Anti-counterfeiting

ABI Research: 70.5 Billion US$

in 2017, 20% rising annually,

including tag, reader, SW and

service.

Page 6: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

RFID system and security

Page 7: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

RFID system and security

Page 8: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

RFID system and security

Authentication

and data integrity

RF interface

protection

Tag data

protection

Password

Keyed-Hash Message Authentication Code (HMAC)

Digital signatures

Cover-coding (exclusive-or (XOR) operation)

Encryption of data in transit

Electromagnetic shielding

Radio frequency selection

Temporary deactivation of tags

Tag memory access control

Encryption of data

Kill feature

Tamper resistance( easily broken antenna)

Security technology for RFID

Page 9: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

RFID system and security

RF

Interface

Crypto

MCUComputer

HW/SW

Crypto

Reader

Crypto

Analytic

Sys.

Data Pro.

RFID tag

Digital &

Memory

RF

Interface

Database CryptoIssue

Sys.

App

Sys.

Key

Manage

ment

System

Personalizat

ion

Controller

Issue

Eqipment

RFID

Tag

Computer

HW/SW

Crypto

Middleware

Data Pro.

RFID crypto system

Page 10: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

Contents

RFID system and security

Why crypto in RFID is needed in China?

RFID crypto standard system

RFID crypto applications

Introduction to RFID crypto workgroup

Page 11: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

Why crypto in RFID is needed in China?

Anti-counterfeiting

Anti-counterfeiting market: 120

Billion US$ annually in China,

for medicine, food, cigarette and

white liquor.

Page 12: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

Why crypto in RFID is needed in China?

Animal product tracking

Page 13: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

Why crypto in RFID is needed in China?

Standard made by Ministry of Commerce

2012

bottled white liquor anti-counterfeiting

based on RFID

1. Application data coding

2. Tags technique requirements

3. Readers technique requirements

4. Inquires service process

Page 14: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

Contents

RFID system and security

Why crypto in RFID is needed in China?

RFID crypto standard system

RFID crypto applications

Introduction to RFID crypto workgroup

Page 15: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

RFID crypto standard system

Algorithm

Hardware

Protocol

Infrastructure product

test

standard

RFID general crypto app. services

RFID applications

transprtation

Anti-conterfeiting

E-ticket payment

4 security levels 7 elements

IOT

Smart transportation Logistics

Smart grid

healthcare

Public security Financial

Military

Agriculture Home furnishing

Environment monitoring

E-passport

ETC

…… ……

…… ……

management

RFID crypto application technical system

Page 16: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

RFID crypto standard system

RFID

test

and

evalua-

tion

standard

class

RFID

manage-

ment

standard

class

RFID foundation standard class

RFID technical standard class

Crypto algorithm IP

Crypto device

Crypto service sys.

RFID crypto app. service

Crypto protocol app.

interface

RFID crypto algorithm

Crypto IC RFID crypto

hardware

RFID crypto

protocol

RFID general crypto app. service

RFID crypto standard system

Page 17: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

RFID crypto standard system

Analytic system security

Middleware security

Reader security

RFID tag security

Commu. security

Commu. security

Commu. security

Keymanagement

RFID crypto workgroup focuses those standards

Page 18: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

RFID crypto standard system

4. Specification for Key Management

2. Specification of Cryptographic Application for RFID Tag Chip

3. Specification of Cryptographic Application for RFID Reader

1. Specification of Cryptographic Application for Communication between RFID Tag and Reader

Crypto protocol standard

Crypto device standard

Crypto infrastructure

standard

Specifications of Cryptographic Application

for RFID Systems

5. Cryptographic Protection Framework and Security Levels

RFID crypto workgroup made those standards

Page 19: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

RFID crypto standard system

Elements\levels Level 1 Level 2 Level 3 Level 4

Confidentiality √ √

Integrity √ √

Non-repudiation △ √

Identity

authentication

△ √ √ √

Access control √ √ √

Audit √

Crypto algorithm √ √ √

Security elements and security levels for RFID system

Page 20: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

Contents

RFID system and security

Why crypto in RFID is needed in China?

RFID crypto standard system

RFID crypto applications

Introduction to RFID crypto workgroup

Page 21: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

And Chinese commercial crypto

algorithms are also be used.

Type algorithm name Key length Block length Clock Logic gates App. Eva.

symmetric

block AES 128bit 128bit 1032 3.4K Yes

DES like 56bit 64bit 144 2.3K Yes

Hummingbird 64~256bit 1.023K Yes

present 80bit 32 1K~1.8K Yes

stream Trivium64 64bit —— 1 5.5K No

asymmet

ric

ECC/RSA —— 10K~30K No

IBC —— 大于100K No

others Hash SHA-1 160bit —— 1228 8.1K No

Tav-128 128bit —— 1568 2.578K Yes

RFID crypto applications—algorithms

Page 22: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

RFID crypto applications

HF Products (13.56MHz)

No. Product Certificate Crypto

1 System SXH2010058 128b symmetric

2 Reader SXH2009051 128b symmetric/HASH/PKI

3 Reader SXH2010100 128b symmetric/HASH/PKI

4 Tag IC SXH2009087 128b symmetric

5 Tag IC SXH2010028 128b symmetric

6 Tag IC SXH2010039 128b symmetric

7 Tag IC SXH2009021 128b symmetric

8 Tag IC SXH2011016 128b symmetric

9 Tag IC —— 64b symmetric

Page 23: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

RFID crypto applications

UHF Products (800/900MHz)

Tag IC with 128b symmetric algorithm

Reader SAM

Key management system

Page 24: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

RFID crypto applications

VREG

DEMOD

RECT

MOD

OSC

POR

PAD

PAD

AFE LOGIC

NVM

VDD

Din

Dout

W/R

ADDR

DATA

ANTENN

A

Crypto

algorithm

The 1st UHF tag IC with symmetric crypto

algorithm with ultra low power design, ~uW

Page 25: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

RFID crypto applications

Page 26: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

Contents

RFID system and security

Why crypto in RFID is needed in China?

RFID crypto standard system

RFID crypto applications

Introduction to RFID crypto workgroup

Page 27: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

Introduction to RFID crypto workgroup

Cryptography Standardization Technical Committee

11 members Beijing CEC Huada Electronic Design Co., Ltd.

Xingtang Communication Technology Co., Ltd.

Shanghai Hsic Application System Co., Ltd.

Shanghai Fudan Microelectronics Group Company Limited

Tongfang Microelectronics Company

Fudan University

Aisino Corporation Inc.

Shanghai Huahong Integrated Circuit Co., Ltd.

Beijing Huadazhibao Electronic System Co., Ltd

Westone Information Industry Co., Ltd.

Zhejiang ELamda System Engineering Co., Ltd.

RFID Crypto Workgroup

Page 28: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

Introduction to RFID crypto workgroup

Xingtang Communication

Westone Information

Fudan University

RFID

WG

APP.

IC Reader

Crypto

Huada Electronics

Fudan Microelectronics

Tongfang Microelectronics

Huahong IC

Aisino Co.

Shanghai HSIC

Zhejiang Elamda

Huadazhibao

Shanghai HSIC

Aisino Co.

Zhejiang Elamda

Huadazhibao

Page 29: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

We are working for RFID crypto

application, you are welcome to join us.

Page 30: Cryptography in RFID and Its Applications in China · Authentication and data integrity RF interface ... RFID crypto standard system Algorithm Hardware Protocol Infrastructu re product

Thanks