Mancy Chan's profile

jutaigateaccess

The RFID tag and card reader introduction

Security is an important issue for RFID systems, but the security of RFID systems (generally provided by label and tag reader vendors) has not been enough. Most of today's RFID tags use an old encryption algorithm with a 48-bit key that can be cracked in a few hours using a laptop.
However, the situation has improved. Some RFID vendors have introduced tags and readers that support advanced encryption algorithms with 64-bit keys. From a 48-bit key to a 64-bit key, the security performance is improved by more than 50%. The 64-bit algorithm is 64,000 times more efficient than the 48-bit algorithm in terms of the number of factorial combinations of key lengths. Therefore, 64-bit keys are more difficult to crack. Designers should choose a label that provides an efficient and secure encryption algorithm with a key length of at least 64 bits.


The RFID tag and card reader

The security of an RFID tag can only be as high as the security of the tag reader that reads it. In other words, the 64-bit encryption algorithm on advanced RFID tags is only useful if the tag reader or host supports such 64-bit encryption algorithms. Like RFID tags, most tag readers on the market today only support minimal security and use old encryption algorithms and too short a key length, making them easy to crack. The new, more secure reader will support advanced military-grade 128-bit AES encryption algorithms while also supporting simpler encryption algorithms. They also allow for password protection and allow for the use of optional encryption algorithms in multiple encryption zones on RFID tags. As the saying goes, change is eternal. The same is true for security and RFID applications. Encryption algorithms are constantly being updated and improved, and the keys are getting longer and stronger. Since RFID is an emerging technology, the feature set on RFID tags is expected to continue to evolve over time to adapt to changing supply chain requirements. Keep in mind when selecting RFID tags and readers that some readers can only be upgraded by manually changing the hardware in the device. Imagine disassembling and updating thousands of devices at every point of the supply chain from manufacturer to consumer if you want to dispatch equipment maintenance personnel to each entrance to the building to disassemble and update each card reader. The card reader, this will be a very troublesome thing. Flexibility is a key feature of RFID systems. The new RFID reader simply uploads new firmware and allows all devices on the network to be upgraded over the network. This tag reader not only supports Internet-based firmware upgrades but also allows multiple card reader networks to be upgraded at a single remote location. RFID applications are starting to grow rapidly in demanding pharmaceutical, cashless transactions and identity applications with very high-security requirements. These emerging applications require a large amount of data and security measures, as well as the ability to provide security services to multiple users. RFID system designers should begin with the design of tag readers that support the level of security required for the application and can be easily upgraded. RFID tags should be defined as having enough memory to accommodate all the required data and should be configurable enough to be configured in a separate storage area to support all of the different users in the supply chain.
jutaigateaccess
Published:

jutaigateaccess

Published:

Creative Fields