CFP last date
20 January 2025
Reseach Article

An Implementation of MD5 Hash Algorithm for RFID Tags

by Nurbek Saparkhojayev, Olzhas Shaiken
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 72 - Number 22
Year of Publication: 2013
Authors: Nurbek Saparkhojayev, Olzhas Shaiken
10.5120/12674-9352

Nurbek Saparkhojayev, Olzhas Shaiken . An Implementation of MD5 Hash Algorithm for RFID Tags. International Journal of Computer Applications. 72, 22 ( June 2013), 28-34. DOI=10.5120/12674-9352

@article{ 10.5120/12674-9352,
author = { Nurbek Saparkhojayev, Olzhas Shaiken },
title = { An Implementation of MD5 Hash Algorithm for RFID Tags },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 72 },
number = { 22 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 28-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume72/number22/12674-9352/ },
doi = { 10.5120/12674-9352 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:38:37.323561+05:30
%A Nurbek Saparkhojayev
%A Olzhas Shaiken
%T An Implementation of MD5 Hash Algorithm for RFID Tags
%J International Journal of Computer Applications
%@ 0975-8887
%V 72
%N 22
%P 28-34
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper discusses RFID technology, and shows the implementation of MD5 hash algorithm for RFID tags to protect private data from counterfeiting and copying. Privacy and security of RFID tags are discussed and the implementation of this algorithm is shown. Authors present new technology of reading the data from RFID- cards by using MD5 hash function. The reason of applying this algorithm is trivial: it is fast comparing to other algorithms, and can handle small-fixed size of data, which is stored in low-cost RFID-cards, which means that it has 1 Kb of memory. This work was done as a part of project called "Smart Campus" in Suleyman Demirel University, Almaty, Kazakhstan.

References
  1. Nurbek Saparkhojayev and Selim Guvercin, "Attendance Control System based on RFID-technology", IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 3, No 1, May 2012.
  2. S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. " Security in Pervasive Computing, 2003, pp 201-212.
  3. F. Silva, V. Filipe, A. Pereira, "Automatic control of students' attendance in classrooms using RFID", in 3rd International Conference on Systems and Networks Communication, 2008, pp 384-389.
  4. S. Kadry and M. Smaili, "Wireless attendance management system based on iris recognition", Scientific Research and Essays, Vol. 5(12), 18 June 2010, pp. 1428-1435.
  5. V. Shehu and A. Dika, "Using real time computer vision algorithms in automatic attendance management systems", Proceedings of the ITI 2010 32nd International Conference on Information Technology Interfaces, 21-24 June, 2010, Cavtat, Croatia.
  6. Xiaoyun Wang, Dengguo Feng, Xuejia Lai and Hongbo Yu, "Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD", 2004.
  7. I. N. Tselepis, M. P. Bekakos, A. S. Nikitakis and E. A. Lipitakis, "MD5 Hash Algorithm Hardware Realization on a Reconfigurable FPGA Platform", HERCMA CONFERENCE "COMPUTER MATHEMATICS, PROGRAMMING AND SOFTWARE APPLICATIONS", 2007.
  8. NXP official web-site. For additional information, visit http://www. nxp. com.
  9. Stronglink Technology Co, Ltd. Official website: http://www. stronglink-rfid. com.
  10. M. Dhanalakshmi and U. Mamatha, "RFID based library management system", Proceedings of ASCNT, pp. 227-234,2009.
  11. S. B. Patil and R. M. Walli, "Design and Development of fully automatic AT89C52 based low cost embedded system for rail tracking", International Journal of electronic communication and soft computing science and engineering", Vol. 1, Issue 1.
Index Terms

Computer Science
Information Sciences

Keywords

RFID technology counterfeiting MD5 algorithm privacy security