Radio Frequency Identification Securing Your Personal Information November 10, 2005.
-
Upload
donald-sharp -
Category
Documents
-
view
213 -
download
0
Transcript of Radio Frequency Identification Securing Your Personal Information November 10, 2005.
![Page 1: Radio Frequency Identification Securing Your Personal Information November 10, 2005.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ed15503460f94be022d/html5/thumbnails/1.jpg)
Radio Frequency IdentificationSecuring Your Personal Information
November 10, 2005
![Page 2: Radio Frequency Identification Securing Your Personal Information November 10, 2005.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ed15503460f94be022d/html5/thumbnails/2.jpg)
What is RFID?
Radio Frequency Identification1. RF Transmitter & Reader
2. RFID-Enabled Transponder
RF Transmitter broadcasts signal
RFID-Enabled
Transponder
RF Transmitter
& Reader
Signal
RFID Data
![Page 3: Radio Frequency Identification Securing Your Personal Information November 10, 2005.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ed15503460f94be022d/html5/thumbnails/3.jpg)
RFID in the Marketplace
RFID technology is present in many areas of business1 “Blink” credit card processing
Image provided by: JP Morgan Chase & Co.
![Page 4: Radio Frequency Identification Securing Your Personal Information November 10, 2005.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ed15503460f94be022d/html5/thumbnails/4.jpg)
RFID in the Marketplace
RFID technology is present in many areas of business1 “Blink” credit card processing
2 Employee identification
Image provided by: RFID USA
![Page 5: Radio Frequency Identification Securing Your Personal Information November 10, 2005.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ed15503460f94be022d/html5/thumbnails/5.jpg)
RFID in the Marketplace
RFID technology is present in many areas of business1 “Blink” credit card processing
2 Employee identification
3 US Passports
Image provided by: US Department of State
![Page 6: Radio Frequency Identification Securing Your Personal Information November 10, 2005.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ed15503460f94be022d/html5/thumbnails/6.jpg)
Security Standards
RFID uses basic hash table encryption3 RF Transmitters can be easily replicated
4 Transponders can be activated unintentionally
RFID-Enabled
Transponder
RF Transmitter
& Reader
1. Transponder Activation Signal
2. Encrypted DataCard Number: 54485891230985648923098435709634098234579523
![Page 7: Radio Frequency Identification Securing Your Personal Information November 10, 2005.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ed15503460f94be022d/html5/thumbnails/7.jpg)
Linear Probing
Image provided by: http://www.cs.umu.se/~jopsi/dinf504/hashing_probe.gif
![Page 8: Radio Frequency Identification Securing Your Personal Information November 10, 2005.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ed15503460f94be022d/html5/thumbnails/8.jpg)
Double Hashing
RFID uses basic hash table encryption3 RF Transmitters can be easily replicated
4 Transponders can be activated unintentionally
RFID-Enabled
Transponder
RF Transmitter
& Reader
1. Transponder Activation Signal
2. Encrypted DataCard Number: 5485891230985648923098435709634098234579523
Key mod 5 Key mod 20
![Page 9: Radio Frequency Identification Securing Your Personal Information November 10, 2005.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ed15503460f94be022d/html5/thumbnails/9.jpg)
Double Hashing
H1(key) = Key mod 5
H2(key)Key mod 20
2 * (Key mod 20)3 * (Key mod 20)4 * (Key mod 20)
[H1(key) +i*H2(key)] % M
Image provided by: http://www.cs.umu.se/~jopsi/dinf504/hashing_probe.gif
![Page 10: Radio Frequency Identification Securing Your Personal Information November 10, 2005.](https://reader036.fdocuments.us/reader036/viewer/2022072015/56649ed15503460f94be022d/html5/thumbnails/10.jpg)
Questions