Primitive Operations - PowerPoint PPT Presentation

About This Presentation
Title:

Primitive Operations

Description:

Primitive Operations Two Types of Operations Communication Operations Reader to tag Read Write Tag to Tag Read Write Hash and Encryption Operations Hash: MD5, Sha-1 ... – PowerPoint PPT presentation

Number of Views:235
Avg rating:3.0/5.0
Slides: 12
Provided by: cais150
Learn more at: http://www.mysmu.edu
Category:

less

Transcript and Presenter's Notes

Title: Primitive Operations


1
Primitive Operations
2
Two Types of Operations
  • Communication Operations
  • Reader to tag
  • Read
  • Write
  • Tag to Tag
  • Read
  • Write
  • Hash and Encryption Operations
  • Hash
  • MD5, Sha-1, Sha-256, Sha-512
  • Encryption
  • Symmetric AES, DES
  • Asymmetric RSA

3
An Example
  • An example of RFID security protocol
  • A challenge-response protocol
  • Pass 1 the reader sends a challenge C
  • Pass 2 the tag returns a response F(C, key)

Reader to tag Write
Reader to tag Read
4
Tag to Tag Operations
  • An example of RFID security protocol
  • A challenge-response protocol

F(C, Key)
Tag to tag Read
Tag to tag Write
F(x, y)
5
Time Requirements
  • Tag to Tag Operations
  • Read 0.007 ms, Write 16.73 ms, one word
  • Reader to Tag Operations
  • Read 47 ms one word, 57 ms 15 words, 0.5 ms 1
    word

6
Time Requirements
  • Tag to Tag Operations
  • Read 0.007 ms, Write 16.73 ms, one word
  • Reader to Tag Operations
  • Read 47 ms one word, 57 ms 15 words, 0.5 ms 1
    word
  • Write 63 ms one word, increment 20 ms / word

7
Time Requirements
  • Hash and Encryption Operations
  • Hash MD5, Sha-1, Sha-256, Sha-512

Block size (bytes) one block n blocks MD5
55 55 64n Sha-1 55 55 64n Sha-256 55 55
64n Sha-512 111 111128n
8
Time Requirements
  • Hash and Encryption Operations
  • Hash MD5, Sha-1, Sha-256, Sha-512
  • MD5 1.8 ms one block, 3.2 ms two blocks

9
Time Requirements
  • Hash and Encryption Operations
  • Hash MD5, Sha-1, Sha-256, Sha-512
  • Sha-1 5.0ms / block

10
Time Requirements
  • Hash and Encryption Operations
  • Hash MD5, Sha-1, Sha-256, Sha-512
  • Sha-256 11.6ms / block

11
Time Requirements
  • Hash and Encryption Operations
  • Hash MD5, Sha-1, Sha-256, Sha-512
  • Sha-512 41.0ms / block
Write a Comment
User Comments (0)
About PowerShow.com