Hidden Bits Approach for Authentication in RFID Systems
- Cite this paper as:
- Klonowski M., Majcher K., Macyna W., Zagórski F. (2013) Hidden Bits Approach for Authentication in RFID Systems. In: Hoepman JH., Verbauwhede I. (eds) Radio Frequency Identification. Security and Privacy Issues. RFIDSec 2012. Lecture Notes in Computer Science, vol 7739. Springer, Berlin, Heidelberg
We present an authentication scheme designed for tiny and strictly constrained devices like RFID-tags. Authentication is based on the symmetric key shared between a tag and a reader. While a tag needs to perform only simple operations in order to authenticate: to pick n/2 + b random values and then to compute XORs of some values, a reader needs to try 2b possible values to check if a tag replied correctly (b is small). At the same time eavesdropping adversary after r executions of the protocol needs to solve a system of rk-multivariate quadratic equations over GF(2) with nk + rb variables.
We present a security discussion of proposed solutions.
KeywordsRFID lightweight cryptography authentication
Unable to display preview. Download preview PDF.