Noisy Cryptographic Protocols for Low-Cost RFID Tags

Considering some passive eavesdropper, the feasibility of exchanging some secret data between an RFID tag and its reader through public discussion is established. No key distribution is required by our solution; the tag and the reader do not have to share any common data to form a confidential chann...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information theory 2006-08, Vol.52 (8), p.3562-3566
Hauptverfasser: Chabanne, H., Fumaroli, G.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 3566
container_issue 8
container_start_page 3562
container_title IEEE transactions on information theory
container_volume 52
creator Chabanne, H.
Fumaroli, G.
description Considering some passive eavesdropper, the feasibility of exchanging some secret data between an RFID tag and its reader through public discussion is established. No key distribution is required by our solution; the tag and the reader do not have to share any common data to form a confidential channel. For this, a natural phenomenon-the inherent noise on their communication link-is exploited. Classical protocols, consisting after an initialization step in three phases called advantage distillation, information reconciliation and privacy amplification, are then adapted to these highly constrained devices. First, the canvas of our study is presented. Next, the advantage distillation phase is discussed. Then, Brassard and Salvail's Cascade protocol is proved to be modifiable so as to reduce the hardware implementation cost while still maintaining adequate correction rate and tolerable leaked information during the reconciliation phase. Finally, as for the privacy amplification phase, the work on low-cost universal hash functions from Yuumlksel is pointed out, achieving to allege that public discussion under noisy environment might be an interesting possibility for low cost RFID tags
doi_str_mv 10.1109/TIT.2006.878219
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_195910879</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1661835</ieee_id><sourcerecordid>1146127121</sourcerecordid><originalsourceid>FETCH-LOGICAL-c351t-3053bd02a19631ca696a7e4bd2b5d9a9c5d40d9b455bd374f9dc0005c71c947d3</originalsourceid><addsrcrecordid>eNpdkMFLwzAUh4MoOKdnD16KIHjpltckTXOU6XQwVKSeQ5qks6NbatIh--_N6EDw9Hi87_fj8SF0DXgCgMW0XJSTDON8UvAiA3GCRsAYT0XO6CkaYQxFKigtztFFCOu4UgbZCNFX14R9MvP7rncrr7qvRifv3vVOuzYktfPJ0v2kMxf65GO-eExKtQqX6KxWbbBXxzlGn_OncvaSLt-eF7OHZaoJgz4lmJHK4EyByAlolYtccUsrk1XMCCU0MxQbUVHGKkM4rYXRGGOmOWhBuSFjdD_0dt5972zo5aYJ2rat2lq3CxIwgUxwGucY3f5D127nt_E7CYIJwAUXEZoOkPYuBG9r2flmo_w-NsmDRBklyoNEOUiMibtjrQpatbVXW92EvxgXnBRAInczcI219u-c51AQRn4B31V3uQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>195910879</pqid></control><display><type>article</type><title>Noisy Cryptographic Protocols for Low-Cost RFID Tags</title><source>IEEE Electronic Library (IEL)</source><creator>Chabanne, H. ; Fumaroli, G.</creator><creatorcontrib>Chabanne, H. ; Fumaroli, G.</creatorcontrib><description>Considering some passive eavesdropper, the feasibility of exchanging some secret data between an RFID tag and its reader through public discussion is established. No key distribution is required by our solution; the tag and the reader do not have to share any common data to form a confidential channel. For this, a natural phenomenon-the inherent noise on their communication link-is exploited. Classical protocols, consisting after an initialization step in three phases called advantage distillation, information reconciliation and privacy amplification, are then adapted to these highly constrained devices. First, the canvas of our study is presented. Next, the advantage distillation phase is discussed. Then, Brassard and Salvail's Cascade protocol is proved to be modifiable so as to reduce the hardware implementation cost while still maintaining adequate correction rate and tolerable leaked information during the reconciliation phase. Finally, as for the privacy amplification phase, the work on low-cost universal hash functions from Yuumlksel is pointed out, achieving to allege that public discussion under noisy environment might be an interesting possibility for low cost RFID tags</description><identifier>ISSN: 0018-9448</identifier><identifier>EISSN: 1557-9654</identifier><identifier>DOI: 10.1109/TIT.2006.878219</identifier><identifier>CODEN: IETTAW</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Amplification ; Applied sciences ; Channels ; Circuit noise ; Costs ; Cryptographic protocols ; Cryptography ; Data communications ; Distillation ; Exact sciences and technology ; Hardware ; Information theory ; Information, signal and communications theory ; Lightweight cryptography ; noisy environment ; Passive RFID tags ; Privacy ; Protocol ; public discussion protocols ; Radio frequency identification ; Radiofrequency identification ; Radiolocalization and radionavigation ; Readers ; RFID ; RFID tags ; secret-key exchange ; Signal and communications theory ; Tags ; Telecommunications ; Telecommunications and information theory ; Working environment noise</subject><ispartof>IEEE transactions on information theory, 2006-08, Vol.52 (8), p.3562-3566</ispartof><rights>2006 INIST-CNRS</rights><rights>Copyright Institute of Electrical and Electronics Engineers, Inc. (IEEE) Aug 2006</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c351t-3053bd02a19631ca696a7e4bd2b5d9a9c5d40d9b455bd374f9dc0005c71c947d3</citedby><cites>FETCH-LOGICAL-c351t-3053bd02a19631ca696a7e4bd2b5d9a9c5d40d9b455bd374f9dc0005c71c947d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1661835$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1661835$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=17973813$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Chabanne, H.</creatorcontrib><creatorcontrib>Fumaroli, G.</creatorcontrib><title>Noisy Cryptographic Protocols for Low-Cost RFID Tags</title><title>IEEE transactions on information theory</title><addtitle>TIT</addtitle><description>Considering some passive eavesdropper, the feasibility of exchanging some secret data between an RFID tag and its reader through public discussion is established. No key distribution is required by our solution; the tag and the reader do not have to share any common data to form a confidential channel. For this, a natural phenomenon-the inherent noise on their communication link-is exploited. Classical protocols, consisting after an initialization step in three phases called advantage distillation, information reconciliation and privacy amplification, are then adapted to these highly constrained devices. First, the canvas of our study is presented. Next, the advantage distillation phase is discussed. Then, Brassard and Salvail's Cascade protocol is proved to be modifiable so as to reduce the hardware implementation cost while still maintaining adequate correction rate and tolerable leaked information during the reconciliation phase. Finally, as for the privacy amplification phase, the work on low-cost universal hash functions from Yuumlksel is pointed out, achieving to allege that public discussion under noisy environment might be an interesting possibility for low cost RFID tags</description><subject>Amplification</subject><subject>Applied sciences</subject><subject>Channels</subject><subject>Circuit noise</subject><subject>Costs</subject><subject>Cryptographic protocols</subject><subject>Cryptography</subject><subject>Data communications</subject><subject>Distillation</subject><subject>Exact sciences and technology</subject><subject>Hardware</subject><subject>Information theory</subject><subject>Information, signal and communications theory</subject><subject>Lightweight cryptography</subject><subject>noisy environment</subject><subject>Passive RFID tags</subject><subject>Privacy</subject><subject>Protocol</subject><subject>public discussion protocols</subject><subject>Radio frequency identification</subject><subject>Radiofrequency identification</subject><subject>Radiolocalization and radionavigation</subject><subject>Readers</subject><subject>RFID</subject><subject>RFID tags</subject><subject>secret-key exchange</subject><subject>Signal and communications theory</subject><subject>Tags</subject><subject>Telecommunications</subject><subject>Telecommunications and information theory</subject><subject>Working environment noise</subject><issn>0018-9448</issn><issn>1557-9654</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2006</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkMFLwzAUh4MoOKdnD16KIHjpltckTXOU6XQwVKSeQ5qks6NbatIh--_N6EDw9Hi87_fj8SF0DXgCgMW0XJSTDON8UvAiA3GCRsAYT0XO6CkaYQxFKigtztFFCOu4UgbZCNFX14R9MvP7rncrr7qvRifv3vVOuzYktfPJ0v2kMxf65GO-eExKtQqX6KxWbbBXxzlGn_OncvaSLt-eF7OHZaoJgz4lmJHK4EyByAlolYtccUsrk1XMCCU0MxQbUVHGKkM4rYXRGGOmOWhBuSFjdD_0dt5972zo5aYJ2rat2lq3CxIwgUxwGucY3f5D127nt_E7CYIJwAUXEZoOkPYuBG9r2flmo_w-NsmDRBklyoNEOUiMibtjrQpatbVXW92EvxgXnBRAInczcI219u-c51AQRn4B31V3uQ</recordid><startdate>20060801</startdate><enddate>20060801</enddate><creator>Chabanne, H.</creator><creator>Fumaroli, G.</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20060801</creationdate><title>Noisy Cryptographic Protocols for Low-Cost RFID Tags</title><author>Chabanne, H. ; Fumaroli, G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c351t-3053bd02a19631ca696a7e4bd2b5d9a9c5d40d9b455bd374f9dc0005c71c947d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Amplification</topic><topic>Applied sciences</topic><topic>Channels</topic><topic>Circuit noise</topic><topic>Costs</topic><topic>Cryptographic protocols</topic><topic>Cryptography</topic><topic>Data communications</topic><topic>Distillation</topic><topic>Exact sciences and technology</topic><topic>Hardware</topic><topic>Information theory</topic><topic>Information, signal and communications theory</topic><topic>Lightweight cryptography</topic><topic>noisy environment</topic><topic>Passive RFID tags</topic><topic>Privacy</topic><topic>Protocol</topic><topic>public discussion protocols</topic><topic>Radio frequency identification</topic><topic>Radiofrequency identification</topic><topic>Radiolocalization and radionavigation</topic><topic>Readers</topic><topic>RFID</topic><topic>RFID tags</topic><topic>secret-key exchange</topic><topic>Signal and communications theory</topic><topic>Tags</topic><topic>Telecommunications</topic><topic>Telecommunications and information theory</topic><topic>Working environment noise</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chabanne, H.</creatorcontrib><creatorcontrib>Fumaroli, G.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on information theory</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chabanne, H.</au><au>Fumaroli, G.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Noisy Cryptographic Protocols for Low-Cost RFID Tags</atitle><jtitle>IEEE transactions on information theory</jtitle><stitle>TIT</stitle><date>2006-08-01</date><risdate>2006</risdate><volume>52</volume><issue>8</issue><spage>3562</spage><epage>3566</epage><pages>3562-3566</pages><issn>0018-9448</issn><eissn>1557-9654</eissn><coden>IETTAW</coden><abstract>Considering some passive eavesdropper, the feasibility of exchanging some secret data between an RFID tag and its reader through public discussion is established. No key distribution is required by our solution; the tag and the reader do not have to share any common data to form a confidential channel. For this, a natural phenomenon-the inherent noise on their communication link-is exploited. Classical protocols, consisting after an initialization step in three phases called advantage distillation, information reconciliation and privacy amplification, are then adapted to these highly constrained devices. First, the canvas of our study is presented. Next, the advantage distillation phase is discussed. Then, Brassard and Salvail's Cascade protocol is proved to be modifiable so as to reduce the hardware implementation cost while still maintaining adequate correction rate and tolerable leaked information during the reconciliation phase. Finally, as for the privacy amplification phase, the work on low-cost universal hash functions from Yuumlksel is pointed out, achieving to allege that public discussion under noisy environment might be an interesting possibility for low cost RFID tags</abstract><cop>New York, NY</cop><pub>IEEE</pub><doi>10.1109/TIT.2006.878219</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0018-9448
ispartof IEEE transactions on information theory, 2006-08, Vol.52 (8), p.3562-3566
issn 0018-9448
1557-9654
language eng
recordid cdi_proquest_journals_195910879
source IEEE Electronic Library (IEL)
subjects Amplification
Applied sciences
Channels
Circuit noise
Costs
Cryptographic protocols
Cryptography
Data communications
Distillation
Exact sciences and technology
Hardware
Information theory
Information, signal and communications theory
Lightweight cryptography
noisy environment
Passive RFID tags
Privacy
Protocol
public discussion protocols
Radio frequency identification
Radiofrequency identification
Radiolocalization and radionavigation
Readers
RFID
RFID tags
secret-key exchange
Signal and communications theory
Tags
Telecommunications
Telecommunications and information theory
Working environment noise
title Noisy Cryptographic Protocols for Low-Cost RFID Tags
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T17%3A53%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Noisy%20Cryptographic%20Protocols%20for%20Low-Cost%20RFID%20Tags&rft.jtitle=IEEE%20transactions%20on%20information%20theory&rft.au=Chabanne,%20H.&rft.date=2006-08-01&rft.volume=52&rft.issue=8&rft.spage=3562&rft.epage=3566&rft.pages=3562-3566&rft.issn=0018-9448&rft.eissn=1557-9654&rft.coden=IETTAW&rft_id=info:doi/10.1109/TIT.2006.878219&rft_dat=%3Cproquest_RIE%3E1146127121%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=195910879&rft_id=info:pmid/&rft_ieee_id=1661835&rfr_iscdi=true