12.07.2015 Views

RFID - Elektor.pt

RFID - Elektor.pt

RFID - Elektor.pt

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CONTENTS3.3 Card Antennas ....................................... 983.3.1 Standard Cards (ID-1) ............................ 983.3.2 Tokens with Smaller Inlays (Smaller than ID-1) ........... 1003.4 Impedance Measurements with the miniVNA .................. 1013.4.1 miniVNA User Software. ........................... 1023.4.2 Disadvantages and Limitations of the miniVNA ........... 1023.4.2.1 Lack of Sign for Imaginary Numbers . . . . . . . . . . . . 1023.4.2.2 Lack of Calibration and Compensation ........... 1023.4.3 How Do I Find the Correct Compensation? .............. 1033.4.4 Coil Inductance Measurement ....................... 1054 Security and Cry<strong>pt</strong>ography ................................ 1094.1 Protection Objectives .................................. 1094.1.1 Keeping Data Secure ............................. 1094.1.2 Data Integrity .................................. 1114.1.3 Privacy Protection ............................... 1124.2 Attacks on Smartcards ................................. 1124.2.1 Logical Attacks ................................. 1124.2.1.1 Unauthorized Reading of Data. ................ 1124.2.1.2 Unauthorized Manipulation of Data ............. 1134.2.1.3 ‘Replay’ Attack ........................... 1144.2.1.4 ‘Relay’ Attack ............................ 1144.2.1.5 ‘Man-in-the-Middle’ Attack ................... 1164.2.1.6 Denial-of-Service Attack .................... 1164.2.2 Physical Attacks. ................................ 1164.2.2.1 Side Channel Attacks and Power Analysis ........ 1164.2.2.2 Reverse Engineering ....................... 1184.2.2.3 Light and Laser Attacks ..................... 1194.2.2.4 Temperature and Frequency. ................. 1204.2.3 Combined Attacks ............................... 1204.3 Cry<strong>pt</strong>ography ........................................ 1204.3.1 Asymmetric Cry<strong>pt</strong>ography. ......................... 1204.3.2 Symmetric Cry<strong>pt</strong>ography .......................... 1224.3.3 Block and Stream Cipher .......................... 1234.3.4 Encry<strong>pt</strong>ion Standards: DES and AES .................. 1244.3.5 DES Cascading. ................................. 1254.3.6 Operation mode ................................. 1274.3.6.1 Electronic Code Book (ECB) .................. 1274.3.6.2 Cipher Block Chaining (CBC). ................. 1274.4 Application of Cry<strong>pt</strong>ography .............................. 1294.4.1 Mutual Authentication ............................. 1294.4.2 Data Encry<strong>pt</strong>ion ................................. 1314.4.3 Message Authentication Code (MAC) .................. 1314.4.4 Key Management ................................ 1324.4.4.1 Dynamic Keys ............................ 1324.4.4.2 Key Diversification. ........................ 1324.4.5 Secure Application Module (SAM). ..................... 1354.4.6 Security Assessment .............................. 135copyright <strong>Elektor</strong>5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!