The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March/April (2012 vol.10)
pp: 76-79
Diana Maimut , École normale supérieure
Khaled Ouafi , École polytechnique fédérale de Lausanne
ABSTRACT
RFID tags pose privacy risks that have only been somewhat addressed. Achieving acceptable levels of security and privacy will require a combination of software and hardware solutions.
INDEX TERMS
lightweight cryptography, cryptography, RFID, RFID tags, privacy, HB protocols, HB+, HB#, LPN, learning parity with noise, man-in-the-middle attacks, computer security.
CITATION
Diana Maimut, Khaled Ouafi, "Lightweight Cryptography for RFID Tags", IEEE Security & Privacy, vol.10, no. 2, pp. 76-79, March/April 2012, doi:10.1109/MSP.2012.43
REFERENCES
1. A. Poschmann, "Lightweight Cryptography—Cryptographic Engineering for a Pervasive World," doctoral dissertation, Faculty of Electrical Eng. and Information Technology, Ruhr-Universität Bochum, 2009; www.emsec.rub.de/media/crypto/attachments/ files/2010/04thesis_poschmann.pdf.
2. S. Vaudenay, "On Privacy Models for RFID," Advances in Cryptology—AsiaCrypt 2007, LNCS 4833, Springer, 2007, pp. 68–97.
3. A. Juels and S.A. Weis, "Defining Strong Privacy for RFID," Proc. 5th Ann. IEEE Int'l Conf. Pervasive Computing and Communications Workshops, IEEE Press, 2007, pp. 342–347; http://eprint.iacr.org/2006137.
4. R.H. Deng et al., "A Zero-Knowledge Based Framework for RFID Privacy," J. Computer Security, vol. 19, no. 6, 2011, pp. 1109–1146.
5. K. Ouafi, "Security and Privacy in RFID Systems," PhD thesis 5283, École polytechnique fédérale de Lausanne, 2012.
6. A. Juels and S.A. Weis, "Authenticating Pervasive Devices with Human Protocols," Advances in Cryptology—Crypto 2005, LNCS 3621, Springer, 2005, pp. 293–308.
7. H. Gilbert, M.J.B. Robshaw, and H. Sibert, "An Active Attack against HB+: A Provably Secure Lightweight Authentication Protocol," Electronics Letters, vol. 41, no. 21, 2005, pp. 1169–1170.
8. H. Gilbert, M.J.B. Robshaw, and Y. Seurin, "HB#: Increasing the Security and Efficiency of HB+," Advances in Cryptology—EuroCrypt 2008, LNCS 4965, Springer, 2008, pp. 361–378.
9. K. Ouafi, R. Overbeck, and S. Vaudenay, "On the Security of HB# against a Man-in-the-Middle Attack," Advances in Cryptology—AsiaCrypt 2008, LNCS 5350, Springer, 2008, pp. 108–124.
7 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool