National Repository of Grey Literature 2 records found  Search took 0.01 seconds. 
Authentication with RFID tags
Klečka, Jan ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
The bachaleror thesis deals with issue of RFID elements and authentication systems used by elements of RFID and chip cards. The basic differences between active and passive RIFD tags are decsribed. The thesis describes basic attacks which can threat communication between reader and RFID device in wireless comunication. In the thessis is included measuring of passive RFID tags. Results of the measurement are presented by tables and graphs. Main goal of this thesis aims at the implementation of the authentication protocol which is mainly for processor cards. Because of the processor we can use cryptography where is neccessary computing power. We can ensure secure data transfer and authentication. The thesis describes 2 schemes of one authentication protocol, which were modificated for BasicCard Enviroment. In the first scheme client(card) authenticate to the terminal using secure AES 256 bit data transfer and verifier is the terminal side. Data which needs to be exchanged is secured by AES 256 bit. In the second scheme the card side is a verifier and the card generates such data to verify that the other party is able to authenticate.
Authentication with RFID tags
Klečka, Jan ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
The bachaleror thesis deals with issue of RFID elements and authentication systems used by elements of RFID and chip cards. The basic differences between active and passive RIFD tags are decsribed. The thesis describes basic attacks which can threat communication between reader and RFID device in wireless comunication. In the thessis is included measuring of passive RFID tags. Results of the measurement are presented by tables and graphs. Main goal of this thesis aims at the implementation of the authentication protocol which is mainly for processor cards. Because of the processor we can use cryptography where is neccessary computing power. We can ensure secure data transfer and authentication. The thesis describes 2 schemes of one authentication protocol, which were modificated for BasicCard Enviroment. In the first scheme client(card) authenticate to the terminal using secure AES 256 bit data transfer and verifier is the terminal side. Data which needs to be exchanged is secured by AES 256 bit. In the second scheme the card side is a verifier and the card generates such data to verify that the other party is able to authenticate.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.