| Radio Frequency Identification (RFID) is rapidly developing technology, which can be used in non-contact automatic identification. This technology is widely used in logistics, access control and electronic toll. However, at the beginning security issues are not considered comprehensively. As technology develops, RFID has caused much security risks and privacy issue. Only when the RFID security properly solved, can RFID technology can develop rapidly.This paper analyzes the security threads of RFID tags and also analyzes the related solutions. Hummingbird-2cryptographic algorithm is analyzed emphatically. The baseband of a secure tag is implemented with can work in ISO18000-6C protocol. The secure tag can resist tracking, forgery and illegal access attack. This paper also analyzes a series of lightweight cryptographic algorithms and security protocols, and implements them based on Hummingbird-2. Technology to reduce power is used. Simulation is done with different progress and frequency. Compared with published work, with equal area, our Hummingbird-2circuit can encrypt data faster with lower power consumption. Baseband in improved protocol is implemented inSMIC0.13μ m, of which the area is105788.0469square microns, and the power consumption of9.912microwatts. The simulation and verification results show that the design meets the work requirements of passive tags. |