Font Size: a A A

The Research And Development Of 2.45GHz RFID Encryption Tag

Posted on:2011-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:Q FuFull Text:PDF
GTID:2178360308964141Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
The Radio Frequency Identification (RFID) uses radio frequency signal to realize the contactless data exchange by space coupling (electromagnetic fields) and then achieve the automatic identification. It has several advantages such as long identification distance, speedy identification, high identification accuracy, multi-target identification, moving target identification, high anti-jam ability and relatively long life. Although,the RFID technology is applied widely, the lack of security mechanism cannot be ignored. The radio communication between RIFD tags and RFID reader provides a flexible and convenient information transmission, while it also makes the information exposed in the wireless environment. Undoubtedly, it is the most threat for information security. Obviously, there is no reliable information security mechanism, there is no effective way to protect the data of RFID tags.This paper is aiming at the RFID safety problem for further research. Combining the university-industry cooperation project of guangdong province(The Research of 2.45GHz RFID System), a hardware encryption scheme for 2.45GHz RFID tags based on FPGA has been proposed. In this paper, the following works have been done.Firstly, the theory of DES and 3DES algorithm has been researched, and the 3DES algorithm system has been designed by the Top-Down way. On the integrated development platform of Xilinx, it has realized the RTL circuit design using the Verilog HDL language, and also the function of the waveform simulation behavior on the modelsim 5.3 platform.Secondly, The hardware design scheme of 2.45 GHz RFID encryption card has been proposed. It Mainly includes the system design of MCU, RF transceiver, FPGA , power and so on.Finally, based on the security protocol of 2.45 GHz RFID encryption tag firmware, the registers configuration process of MCU and RF transceiver have been presented, and also the state transition and working process.
Keywords/Search Tags:3DES/DES Algorithm, Line Structure, RFID, Top-Down, Encryption Tag
PDF Full Text Request
Related items