Séminaire de Cryptographie

Accueil     Présentation     Archives

Adi Shamir


Security Algorithms for Highly Constrained Devices such as RFIDTags

RFID tags are tiny computational devices with no internal source of power, which are likely to be deployed in a large number of applications in the next few years. In this talk I will describe several light weight security algorithms which were designed specifically for such devices, and in particular a new hash function called SQUASH which is provably at least as one-way as the Rabin scheme. It can be implemented with a very small number of gates on RFID tags, and it is extremely fast on larger processors with arbitrary word sizes.