How to improve security and reduce hardware demands of the WIPR RFID protocol

@article{Wu2009HowTI,
  title={How to improve security and reduce hardware demands of the WIPR RFID protocol},
  author={Jiang Wu and Douglas R. Stinson},
  journal={2009 IEEE International Conference on RFID},
  year={2009},
  pages={192-199}
}
In this paper, we analyze and improve WIPR, an RFID identification scheme based on public key techniques with efficient hardware implementation. First we analyze the security and privacy features of WIPR. We show that a reduced version of WIPR is vulnerable to short padding attacks and WIPR needs a random number generator with certain properties to withstand reset attacks. We discuss countermeasures to avoid these attacks. Then we propose two variants of WIPR, namely WIPR-SAEP and WIPR-RNS, to… CONTINUE READING

References

Publications referenced by this paper.
Showing 1-10 of 15 references

Resettable and non-transferable chip authentication for ePassports

  • Carlo Blundo, Guiseppe Persiano, Ahmad-Reza Sadeghi, Ivan Visconti
  • In Conference on RFID Security,
  • 2008
1 Excerpt

WIPR - a Public Key Implementation on Two Grains of Sand

  • Yossef Oren, Martin Feldhofer
  • In Conference on RFID Security, Budapest,
  • 2008
1 Excerpt

Similar Papers

Loading similar papers…