Hidden bits approach for authentication in RFID systems

  • Authors:
  • Marek Klonowski;Krzysztof Majcher;Wojciech Macyna;Filip Zagórski

  • Affiliations:
  • Institute of Mathematics and Computer Science, Wroclaw University of Technology;Institute of Mathematics and Computer Science, Wroclaw University of Technology;Institute of Mathematics and Computer Science, Wroclaw University of Technology;Institute of Mathematics and Computer Science, Wroclaw University of Technology

  • Venue:
  • RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present an authentication scheme designed for tiny and strictly constrained devices like RFID-tags. Authentication is based on the symmetric key shared between a tag and a reader. While a tag needs to perform only simple operations in order to authenticate: to pick n/2+b random values and then to compute XORs of some values, a reader needs to try 2b possible values to check if a tag replied correctly (b is small). At the same time eavesdropping adversary after r executions of the protocol needs to solve a system of rk-multivariate quadratic equations over GF(2) with nk+rb variables. We present a security discussion of proposed solutions.