ABSTRACT

This chapter examines the Electronic Product Code (EPC) Class-1 Generation-2. It identifies some open research issues to increment the security of low-cost Radio frequency identification (RFID) tags. RFID systems are already used for a large number of applications related to object identification: retail stock management, access control, animal tracking, theft prevention, sports timing, and medical applications. Traditional cryptographic primitives exceed the capabilities of low-cost RFID tags, such as those compliant with EPC-C1G2. A. Juels and D. Bailey examine various ways that RFID tags might perform cryptographic functionality while remaining compliant with the EPC-C1G2 standard. The need for random and pseudorandom numbers arises in many cryptographic applications. Juels proposal is based on using memory: Tags store a short list of random identifiers or pseudonyms. The reader computes a bitwise xor of the word with this random number, and transmits the cover code string to the tag.