[go: up one dir, main page]

Avoine et al., 2010 - Google Patents

Tree-based RFID authentication protocols are definitively not privacy-friendly

Avoine et al., 2010

View PDF
Document ID
14270626961595491035
Author
Avoine G
Martin B
Martin T
Publication year
Publication venue
International Workshop on Radio Frequency Identification: Security and Privacy Issues

External Links

Snippet

Authentication for low-cost Radio-Frequency IDentification (RFID) is a booming research topic. The challenge is to develop secure protocols using lightweight cryptography, yet ensuring privacy. A current trend is to design such protocols upon the Learning Parity from …
Continue reading at sites.uclouvain.be (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Similar Documents

Publication Publication Date Title
Juels et al. Authenticating pervasive devices with human protocols
Peris-Lopez et al. Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol
Tan et al. Severless search and authentication protocols for RFID
Shao-hui et al. Security analysis of RAPP an RFID authentication protocol based on permutation
Weis Security parallels between people and pervasive devices
Safkhani et al. Security analysis of LMAP++, an RFID authentication protocol
Dimitriou Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags
Batina et al. Hierarchical ECC-based RFID authentication protocol
Habibi et al. Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard
Deng et al. Tree-LSHB+: An LPN-based lightweight mutual authentication RFID protocol
Alagheband et al. Unified privacy analysis of new‐found RFID authentication protocols
Weis New foundations for efficient authentication, commutative cryptography, and private disjointness testing
Avoine et al. Tree-based RFID authentication protocols are definitively not privacy-friendly
Yousuf et al. A survey of RFID authentication protocols
Ranasinghe et al. Confronting security and privacy threats in modern RFID systems
Kardaş et al. Providing resistance against server information leakage in RFID systems
Habibi et al. Addressing flaws in RFID authentication protocols
Kardaş et al. k‐strong privacy for radio frequency identification authentication protocols based on physically unclonable functions
Morshed et al. Efficient mutual authentication protocol for radiofrequency identification systems
Halevi et al. Using HB family of protocols for privacy-preserving authentication of RFID tags in a population
KR100605138B1 (en) Authorization method in radio frequency identification system
Bilal et al. Ultra-lightweight mutual authentication protocols: Weaknesses and countermeasures
Dolev et al. RFID authentication efficient proactive information security within computational security
Safkhani et al. Cryptanalysis of AFMAP
Sadighian et al. FLMAP: A fast lightweight mutual authentication protocol for RFID systems