Cryptanalysts representation of nonlinearly filtered ML-sequences
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Generalized Inversion Attack on Nonlinear Filter Generators
IEEE Transactions on Computers
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Secure Human Identification Protocols
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
On the Security of Nonlinear Filter Generators
Proceedings of the Third International Workshop on Fast Software Encryption
Smart Fridges with Multimedia Capability for Better Nutrition and Health
UMC '08 Proceedings of the 2008 International Symposium on Ubiquitous Multimedia Computing
The RF in RFID: Passive UHF RFID in Practice
The RF in RFID: Passive UHF RFID in Practice
A content-aware fridge based on RFID in smart home for home-healthcare
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Shake well before use: authentication based on accelerometer data
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Algebraic attacks on stream ciphers with linear feedback
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
The linear complexity of the self-shrinking generator
IEEE Transactions on Information Theory
Hi-index | 0.00 |
This paper introduces the Adopted-Pet (AP) protocol, an automatic (i.e. requiring no human interaction) secure pairing protocol, adequate for the pairing between a passive RFID tag and a reader. Most pairing protocols rely for their security on a certain advantage that the legitimate devices have over any malicious users. Such advantages include proximity (employing near-field communication) or secret keys that are either produced with the assistance of, or verified by, the legitimate user. The advantage exploited by our novel AP protocol is the amount of uninterrupted time spent by the two devices in the proximity (although not requiring near-field communication) of each-other. We discuss several implementation configurations, all based on pseudo-random bit generators, employing short-length LFSRs, and requiring no more than 2000 transistors. This makes the protocol ideally suited for low-cost passive RFID tags. For each configuration we show that the AP protocol is highly secure against occasional malicious entities.