Castelluccia et al., 2006 - Google Patents
Noisy tags: A pretty good key exchange protocol for RFID tagsCastelluccia et al., 2006
View PDF- Document ID
- 15017133755006314790
- Author
- Castelluccia C
- Avoine G
- Publication year
- Publication venue
- International Conference on Smart Card Research and Advanced Applications
External Links
Snippet
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag suggested by Juels, Rivest, and Szydlo, our scheme makes use of special tags that we call …
- 239000000243 solution 0 description 17
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/69—Spread spectrum techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/001—Modulated-carrier systems using chaotic signals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Castelluccia et al. | Noisy tags: A pretty good key exchange protocol for RFID tags | |
| Piramuthu | Protocols for RFID tag/reader authentication | |
| Karthikeyan et al. | RFID security without extensive cryptography | |
| Avoine et al. | An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement | |
| Pateriya et al. | The evolution of RFID security and privacy: A research survey | |
| Kardaş et al. | A novel RFID distance bounding protocol based on physically unclonable functions | |
| Dimitriou | Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags | |
| Tewari et al. | A robust anonymity preserving authentication protocol for IoT devices | |
| Li | Employing lightweight primitives on low-cost rfid tags for authentication | |
| Won et al. | Strong authentication protocol for secure RFID tag search without help of central database | |
| Khor et al. | Security problems in an RFID system | |
| Kardaş et al. | An efficient and private RFID authentication protocol supporting ownership transfer | |
| Shi et al. | A lightweight RFID authentication protocol with confidentiality and anonymity | |
| Alamr et al. | Secure mutual authentication protocol for RFID based on elliptic curve cryptography | |
| Syamsuddin et al. | A survey on low-cost RFID authentication protocols | |
| Song et al. | Scalable RFID pseudonym protocol | |
| Avoine et al. | Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags | |
| Xin et al. | An efficient privacy-preserving RFID ownership transfer protocol | |
| Doss et al. | A secure tag ownership transfer scheme in a closed loop RFID system | |
| Yan et al. | A trust-third-party based key management protocol for secure mobile RFID service based on the Internet of Things | |
| Sadighian et al. | FLMAP: A fast lightweight mutual authentication protocol for RFID systems | |
| Miyaji et al. | Efficient and low-cost rfid authentication schemes | |
| Hancke | Noisy carrier modulation for HF RFID | |
| Wei et al. | Privacy-preserving and undeniable authentication for mobile RFID tags | |
| Hancke | Modulating a noisy carrier signal for eavesdropping-resistant HF RFID |