Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags

  • Claude Castelluccia
  • Gildas Avoine
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3928)


We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag suggested by Juels, Rivest, and Szydlo, our scheme makes use of special tags that we call noisy tags. Noisy tags are owned by the reader’s manager and set out within the reader’s field. They are regular RFID tags that generate noise on the public channel between the reader and the queried tag, such that an eavesdropper cannot differentiate the messages sent by the queried tag from the ones sent by the noisy tag. Consequently, she is unable to identify the secret bits that are sent to the reader. Afterwards, the secret shared by the reader and the tag can be used to launch a secure channel in order to protect communications against eavesdroppers. It can also be used to securely refresh a tag’s identifier by, for example, xoring the new identifier with the exchanged secret key. Refreshing tags’ identifiers improves privacy since it prevents tracking tags.


Hash Function Shared Secret Receive Signal Strength Indicator Secure Channel Passive Adversary 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Avoine, G., Dysli, E., Oechslin, P.: Reducing time complexity in RFID systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 291–306. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  2. 2.
    Avoine, G., Oechslin, P.: RFID traceability: A multilayer problem. In: Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125–140. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  3. 3.
    Castelluccia, C., Mutaf, P.: Shake Them Up! In: ACM/Usenix Mobisys, (June 2005)Google Scholar
  4. 4.
    Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357–370. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  5. 5.
    Gehrmann, C., Nyberg, K.: Enhancements to bluetooth baseband security. In: Nordsec 2001, Copenhagen, Denmark (November 2001)Google Scholar
  6. 6.
    Hoepman, J.-H.: Ephemeral pairing in anonymous networks. Available at,
  7. 7.
    Hoepman, J.-H.: The ephemeral pairing problem. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 212–226. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  8. 8.
    Juels, A., Molnar, D., Wagner, D.: Security and privacy issues in epassports. In: Conference on Security and Privacy for Emerging Areas in Communication Networks – SecureComm 2005, Athens, Greece, IEEE, Los Alamitos (September 2005)Google Scholar
  9. 9.
    Juels, A., Rivest, R., Szydlo, M.: The blocker tag: Selective blocking of RFID tags for consumer privacy. In: Atluri, V. (ed.) Conference on Computer and Communications Security – CCS 2003, Washington, DC, USA, pp. 103–111. ACM Press, New York (October 2003)Google Scholar
  10. 10.
    Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: Pfitzmann, B., Liu, P. (eds.) Conference on Computer and Communications Security – CCS 2004, Washington, DC, USA, pp. 210–219. ACM Press, New York (October 2004)Google Scholar
  11. 11.
    Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: International Workshop on Security Protocols, pp. 172–194 (1999)Google Scholar
  12. 12.
    Weis, S.: Security and privacy in radio-frequency identification devices. Master thesis, Massachusetts Institute of Technology (MIT), Massachusetts, USA (May 2003)Google Scholar
  13. 13.
    Yüksel, K.: Universal hashing for ultra-low-power cryptographic hardware applications. Master thesis, Worcester Polytechnic Institute, Worcester, Massachusetts, USA (April 2004)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2006

Authors and Affiliations

  • Claude Castelluccia
    • 1
  • Gildas Avoine
    • 2
  1. 1.INRIAFrance
  2. 2.EPFLSwitzerland

Personalised recommendations