RFID Secure Credit Card - PowerPoint PPT Presentation

About This Presentation
Title:

RFID Secure Credit Card

Description:

... the process of acquiring and writing Verilog descriptions of the various ... Decide whether to implement Anti ... Transaction Committal. Design Decisions ... – PowerPoint PPT presentation

Number of Views:65
Avg rating:3.0/5.0
Slides: 8
Provided by: stephe224
Category:
Tags: rfid | card | credit | secure

less

Transcript and Presenter's Notes

Title: RFID Secure Credit Card


1
RFID Secure Credit Card
  • 18-525 Project Proposal (M4)
  • Giovanni Fonseca
  • David Fu
  • Amir R. Ahmad Ghiti
  • Stephen Roos

2
Status
  • We are currently in the process of acquiring and
    writing Verilog descriptions of the various
    components of our design
  • To Do
  • Further specify design components
  • Decide whether to implement Anti-collision and
    Anti-tearing blocks
  • Specify the encryption algorithm to be used

3
Project Proposal
  • We plan to implement a secure RFID credit card
    microprocessor
  • The processor will use encrypted communications
    with CRC checks and Challenge/Response sequences
  • The device will conform to current RFID and
    credit card security standards

4
Major Functional Blocks
  • Control Block Coordinates operation of the
    microprocessor, memory, and encryption modules
  • Registers
  • Input (32-bits, 384 trans)
  • Output (32-bits, 384 trans)
  • CRC (16-bits, 220 trans)
  • Logic
  • Challenge/Response Block (32-bits, 20K trans)
  • Misc Control Logic (2K trans)
  • Total 23K transistors

5
General Algorithm
  • Power On Reset
  • Host Challenge/Response
  • Card Challenge/Response
  • Payload Transmission
  • Password Recycle
  • Verification Signal
  • Transaction Committal

6
Design Decisions
  • We decided to implement the card side of the
    technology rather than the host side because of
    the high complexity of the host side
  • We are using a challenge/response token security
    system to verify the validity of the host and the
    card user
  • We decided to use rotating keys to prevent data
    capture/spoofing exploits

7
Problems Questions
  • What kind of encryption should we use for the
    challenge/response algorithm?
  • How should we control the operation of the
    EEPROM?
  • Should we implement anti-tearing and/or
    anti-collision?
Write a Comment
User Comments (0)
About PowerShow.com