Noisy Cryptographic Protocols for Low-Cost RFID Tags

Considering some passive eavesdropper, the feasibility of exchanging some secret data between an RFID tag and its reader through public discussion is established. No key distribution is required by our solution; the tag and the reader do not have to share any common data to form a confidential chann...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information theory 2006-08, Vol.52 (8), p.3562-3566
Hauptverfasser: Chabanne, H., Fumaroli, G.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Considering some passive eavesdropper, the feasibility of exchanging some secret data between an RFID tag and its reader through public discussion is established. No key distribution is required by our solution; the tag and the reader do not have to share any common data to form a confidential channel. For this, a natural phenomenon-the inherent noise on their communication link-is exploited. Classical protocols, consisting after an initialization step in three phases called advantage distillation, information reconciliation and privacy amplification, are then adapted to these highly constrained devices. First, the canvas of our study is presented. Next, the advantage distillation phase is discussed. Then, Brassard and Salvail's Cascade protocol is proved to be modifiable so as to reduce the hardware implementation cost while still maintaining adequate correction rate and tolerable leaked information during the reconciliation phase. Finally, as for the privacy amplification phase, the work on low-cost universal hash functions from Yuumlksel is pointed out, achieving to allege that public discussion under noisy environment might be an interesting possibility for low cost RFID tags
ISSN:0018-9448
1557-9654
DOI:10.1109/TIT.2006.878219