The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
An Overview of Cryptography
Abstract
As Radio Frequency Identification (RFID) devices become ever more ubiquitous it is very likely that demands on them to provide certain types of security such as authentication, confidentiality, and privacy and encryption for security, depending on the application, will increase. This chapter gives a brief overview of cryptographic techniques and protocols. Given the often limited complexity and power of RFID devices, much effort has been devoted to devising so-called “lightweight” cryptographic techniques for such devices, and a few of these are considered in this chapter. Even public key techniques to provide services such as identification and digital signatures have been proposed for some scenarios involving RFID devices, although such devices will obviously require significant computing power. While such applications are seemingly beyond currently available technology, given the speed at which technology is able to yield computational increases at reasonable cost and device size, it seems prudent to consider such protocols at this point.
Related Content
Christopher Nyakotyo, Pedzisai Goronga.
© 2024.
18 pages.
|
Colleen Halupa.
© 2024.
23 pages.
|
Stefan Handke.
© 2024.
14 pages.
|
Jaime Santos-Reyes, Galdino Santos-Reyes, Ricardo Tejeida-Padilla.
© 2024.
19 pages.
|
Ahmad Kayaly.
© 2024.
20 pages.
|
Elizabeth Stroble.
© 2024.
15 pages.
|
Mubango Hazel, Hlanganipai Ngirande, Khathutshelo Khashane.
© 2024.
20 pages.
|
|
|