Crypto Suite

Security

Set of cryptographic algorithms (AES-128, PRESENT, etc.) defined in ISO 29167 for mutual authentication between RFID tags and readers.

Crypto Suite

A RFID cryptographic algorithm set." data-category="Security">Crypto Suite is a defined set of cryptographic algorithms and protocols used for secure communication between RFID readers and tags. The ISO/IEC 29167 standard specifies multiple crypto suites for EPC Gen2 RFID, enabling mutual authentication, data encryption, and tag authentication. Crypto suites transform RFID from a simple identification technology into a secure platform capable of resisting cloning, eavesdropping, and replay attacks.

ISO 29167 Crypto Suites

The ISO 29167 series defines several crypto suite options:

Suite Algorithm Key Size Use Case
CS-1 AES-128 128 bits General-purpose authentication
CS-5 Grain-128A 128 bits Lightweight, low-gate-count ICs
CS-6 PRESENT-80 80 bits Ultra-low-cost tags
CS-7 AES-128 (ECB) 128 bits Simple authentication

AES-128 (CS-1) is the most widely implemented suite because it provides strong security with well-understood cryptographic properties. NXP UCODE DNA and Impinj's authentication-capable ICs typically implement AES-128 in hardware.

Authentication Flow

A typical crypto suite authentication follows a challenge-response pattern:

  1. The reader sends an Authenticate command to the tag, including a random challenge (nonce).
  2. The tag encrypts the challenge using its on-chip secret key and the specified crypto suite algorithm.
  3. The tag returns the encrypted response to the reader.
  4. The reader (or a backend authentication service) decrypts the response using the same key and verifies it matches the original challenge.

For mutual authentication, the process is bidirectional — the tag also challenges the reader, ensuring both parties are legitimate. This prevents rogue readers from extracting data from tags.

Hardware Requirements

Implementing a crypto suite on a tag IC requires dedicated silicon for the cryptographic engine. This increases die size and cost — a tag with AES-128 costs significantly more than a basic EPC-only tag. The trade-off is justified in high-value applications:

  • Pharmaceutical anti-counterfeiting: Verifying drug authenticity at each supply chain handoff
  • Luxury goods: Proving brand authenticity for high-value consumer items
  • Aviation parts: Ensuring safety-critical components are genuine

Key Management

Crypto suite security depends entirely on proper key management. Each tag must be provisioned with a unique secret key during manufacturing. The corresponding keys must be securely distributed to authorised readers or authentication services. Key compromise — whether through physical side-channel attacks on the tag IC or database breaches — invalidates the entire security model. Organisations deploying crypto suites should implement hardware security modules (HSMs) for key storage and role-based access controls for key distribution.

الأسئلة الشائعة

The RFID glossary is a comprehensive reference of technical terms, acronyms, and concepts used in Radio-Frequency Identification technology. It is designed for engineers, system integrators, and project managers who work with RFID and need clear definitions of terms like EPC, backscatter, anti-collision, and ISO 18000.

Yes. RFIDFYI provides glossary definitions in 15 languages including English, Korean, Japanese, Chinese, Spanish, Portuguese, Hindi, Arabic, French, Russian, German, Turkish, Vietnamese, Indonesian, and Thai.