An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP
Table 2
Proposed scheme.
Tag
Reader
Setup phase(i) Both reader and tag agree on a curve, on elliptic curve domain parameters , , , , , and (ii) () is set manually on all the tags (iii) Pick randomly as the private key; then the public key will be
Setup phase (i) Both reader and tag agree on a curve, on elliptic curve domain parameters , , , , , and (ii) Pick randomly as the private key; then the public key will be
Authentication phase
Authentication phase
Computing public key :
Pick randomly as private key; then
Signing :
(a) = Hash()
(b) Select randomly
(c) ; if , go to (b)
(d) ; if , go to (b)
(e) Signature pair is
Verifying :
(a) Check if and are integers in range . If not,
the signature is invalid and rejects the session
(b)
(c)
(d) and
(e)
(f) If , reader is authenticated;
otherwise, it is not and rejects the session
In case of authentication, pick as private key and compute public key
Signing :
(a)
(b) Select randomly
(c) ; if , go to (b)
(d) ; if , go to (b)
(e) Signature pair is
(7)
(8) (ID)
(10) Verifying :
(a) Check if and are integers in the range . If not,