Hidden Bits Approach for Authentication in RFID Systems

  • Marek Klonowski
  • Krzysztof Majcher
  • Wojciech Macyna
  • Filip Zagórski
Conference paper

DOI: 10.1007/978-3-642-36140-1_4

Volume 7739 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Klonowski M., Majcher K., Macyna W., Zagórski F. (2013) Hidden Bits Approach for Authentication in RFID Systems. In: Hoepman JH., Verbauwhede I. (eds) Radio Frequency Identification. Security and Privacy Issues. RFIDSec 2012. Lecture Notes in Computer Science, vol 7739. Springer, Berlin, Heidelberg

Abstract

We present an authentication scheme designed for tiny and strictly constrained devices like RFID-tags. Authentication is based on the symmetric key shared between a tag and a reader. While a tag needs to perform only simple operations in order to authenticate: to pick n/2 + b random values and then to compute XORs of some values, a reader needs to try 2b possible values to check if a tag replied correctly (b is small). At the same time eavesdropping adversary after r executions of the protocol needs to solve a system of rk-multivariate quadratic equations over GF(2) with nk + rb variables.

We present a security discussion of proposed solutions.

Keywords

RFID lightweight cryptography authentication 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Marek Klonowski
    • 1
  • Krzysztof Majcher
    • 1
  • Wojciech Macyna
    • 1
  • Filip Zagórski
    • 1
  1. 1.Institute of Mathematics and Computer ScienceWroclaw University of TechnologyPoland