Research Article

An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP

Table 2

Proposed scheme.

TagReader

Setup phase(i) Both reader and tag agree on a curve, on elliptic curve domain parameters , , , , , and (ii) () is set manually on all the tags
(iii) Pick randomly as the private key; then the public key will be
Setup phase
(i) Both reader and tag agree on a curve, on elliptic curve domain parameters , , , , , and (ii) Pick randomly as the private key; then the public key will be

Authentication phaseAuthentication phase
Computing public key :  
  Pick randomly as private key; then
Signing :
 (a) = Hash()
 (b) Select randomly
 (c) ; if , go to (b) 
 (d) ; if , go to (b) 
 (e) Signature pair is

                         

Verifying :
   (a) Check if and are integers in range . If not,
    the signature is invalid and rejects the session
    (b)
    (c)
    (d) and
    (e)
    (f) If , reader is authenticated;
     otherwise, it is not and rejects the session
In case of authentication, pick as private key and compute public key
Signing :
  (a)
  (b) Select randomly
  (c) ; if , go to (b) 
  (d) ; if , go to (b)
  (e) Signature pair is
(7)
(8) (ID)

                         

  (10) Verifying :
     (a) Check if and are integers in the range . If not,
      the signature is invalid and rejects the session
     (b)
     (c)
     (d) and
     (e)
     (f) If , then the reader rejects the session
  (11)
  (12)
  (13) If and , the tag is authenticated;
   otherwise, it is not and rejects the session