摘要:
Provided is a radio frequency identification (RFID) tag generating method and device, and a contents receiving method using the same. The contents receiving method using the RFID tag generating device includes: a terminal detecting a virtual tag corresponding to contents; receiving a password to be used once, corresponding to the virtual tag; authenticating a user by determining whether the password to be used once corresponds to a password input by the user; receiving an identification code of the virtual tag when the password to be used once corresponds to a password input by the user; and receiving the contents matching the identification code of the virtual tag, and providing the same to the user.
摘要:
Provided are a method and a system for authenticating a radio frequency identification (RFID) tag, by which an RFID reader and an authentication server authenticate the RFID tag by using a cryptographic operation and a protocol.
摘要:
Disclosed are a radio secure reader and a radio secure tag for supporting a secure mode and a normal mode. The radio secure reader for controlling an operation mode of the radio secure tag may include a reader modem to receive the operation mode from the radio secure tag, and a reader processing unit to identify the received operation mode as a normal mode or a secure mode, and to control the radio secure tag based on the identified operation mode.
摘要:
An apparatus for processing an F-function in a SEED encryption system includes: an arithmetic operation masking conversion unit for converting a logical operation mask value obtained by performing a logical operation of a SEED F-function input value and a random mask value into an arithmetic operation mask value; and a masking G-function unit for taking the arithmetic operation mask value from the arithmetic operation masking conversion unit as an input and producing an arithmetic operation output.
摘要:
Provided are a method for passive radio frequency identification (RFID) security according to a security mode. An RFID tag transmits its own current security mode to a reader and the reader drives a security protocol depending on the current security mode of the RFID tag. Also, the reader grasps the ability of the tag and then the reader drive a protocol suitable for the ability through the security mode.
摘要:
An apparatus for generating a secret key generates the secret key by using information of a mobile RFID terminal, transmits the generated secret key to an RFID tag attached on an article, and decrypts a unique item identifier of the article encrypted by using the generated secret key after receiving the unique item identifier of the article encrypted by using the secret key from the RFID tag. By this configuration, it is possible to protect user's personal privacy of the mobile RFID terminal in a state where user's intervention is minimized.
摘要:
Disclosed is a method for implementing a symmetric key encryption algorithm against power analysis attacks, including: generating and storing an affine transform table; generating and storing a masked inversion table; and operating a masked S-box using the affine transform table and the masked inversion table.
摘要:
A Revest, Shamir and Adleman (RSA) signature method includes: creating an initial hidden value using a private key and an RSA modular; converting a message to a hidden message by blinding the message using the initial hidden value and the RSA modular; obtaining a result value by performing double exponentiation on the hidden message, the initial hidden value, the RSA modular and the private key; and recovering a signature value using the result value. The RSA signature method further includes updating the initial hidden value with a new hidden value after the recovering.
摘要:
A masking operation method for a symmetric key encryption system includes, when at least two Substitution-boxes (S-boxes) are input, generating a masking S-box table for one S-box which was input; and performing an operation on one masking S-box by referring to the generated masking S-box table. Further, the masking operation method for the symmetric key encryption system includes performing an operation on a remaining masking S-box for a remaining S-box, which was input, by referring to the masking S-box table.
摘要:
An exemplary embodiment of the present invention provides a method and an apparatus for minimizing a difference in data path between elliptic curve point addition and elliptic curve point doubling. An elliptic curve encryption method includes a first operation step of performing point addition for two points when two points on an elliptic curve are different from each other, and a second operation step of performing point doubling for any one point when two points on the elliptic curve are the same, wherein inverse multiplication processes and multiplication processes of the first operation step and the second operation step have the same path delay.