Noisy Cryptographic Protocols for Low-Cost RFID Tags
Considering some passive eavesdropper, the feasibility of exchanging some secret data between an RFID tag and its reader through public discussion is established. No key distribution is required by our solution; the tag and the reader do not have to share any common data to form a confidential chann...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information theory 2006-08, Vol.52 (8), p.3562-3566 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3566 |
---|---|
container_issue | 8 |
container_start_page | 3562 |
container_title | IEEE transactions on information theory |
container_volume | 52 |
creator | Chabanne, H. Fumaroli, G. |
description | Considering some passive eavesdropper, the feasibility of exchanging some secret data between an RFID tag and its reader through public discussion is established. No key distribution is required by our solution; the tag and the reader do not have to share any common data to form a confidential channel. For this, a natural phenomenon-the inherent noise on their communication link-is exploited. Classical protocols, consisting after an initialization step in three phases called advantage distillation, information reconciliation and privacy amplification, are then adapted to these highly constrained devices. First, the canvas of our study is presented. Next, the advantage distillation phase is discussed. Then, Brassard and Salvail's Cascade protocol is proved to be modifiable so as to reduce the hardware implementation cost while still maintaining adequate correction rate and tolerable leaked information during the reconciliation phase. Finally, as for the privacy amplification phase, the work on low-cost universal hash functions from Yuumlksel is pointed out, achieving to allege that public discussion under noisy environment might be an interesting possibility for low cost RFID tags |
doi_str_mv | 10.1109/TIT.2006.878219 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_195910879</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1661835</ieee_id><sourcerecordid>1146127121</sourcerecordid><originalsourceid>FETCH-LOGICAL-c351t-3053bd02a19631ca696a7e4bd2b5d9a9c5d40d9b455bd374f9dc0005c71c947d3</originalsourceid><addsrcrecordid>eNpdkMFLwzAUh4MoOKdnD16KIHjpltckTXOU6XQwVKSeQ5qks6NbatIh--_N6EDw9Hi87_fj8SF0DXgCgMW0XJSTDON8UvAiA3GCRsAYT0XO6CkaYQxFKigtztFFCOu4UgbZCNFX14R9MvP7rncrr7qvRifv3vVOuzYktfPJ0v2kMxf65GO-eExKtQqX6KxWbbBXxzlGn_OncvaSLt-eF7OHZaoJgz4lmJHK4EyByAlolYtccUsrk1XMCCU0MxQbUVHGKkM4rYXRGGOmOWhBuSFjdD_0dt5972zo5aYJ2rat2lq3CxIwgUxwGucY3f5D127nt_E7CYIJwAUXEZoOkPYuBG9r2flmo_w-NsmDRBklyoNEOUiMibtjrQpatbVXW92EvxgXnBRAInczcI219u-c51AQRn4B31V3uQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>195910879</pqid></control><display><type>article</type><title>Noisy Cryptographic Protocols for Low-Cost RFID Tags</title><source>IEEE Electronic Library (IEL)</source><creator>Chabanne, H. ; Fumaroli, G.</creator><creatorcontrib>Chabanne, H. ; Fumaroli, G.</creatorcontrib><description>Considering some passive eavesdropper, the feasibility of exchanging some secret data between an RFID tag and its reader through public discussion is established. No key distribution is required by our solution; the tag and the reader do not have to share any common data to form a confidential channel. For this, a natural phenomenon-the inherent noise on their communication link-is exploited. Classical protocols, consisting after an initialization step in three phases called advantage distillation, information reconciliation and privacy amplification, are then adapted to these highly constrained devices. First, the canvas of our study is presented. Next, the advantage distillation phase is discussed. Then, Brassard and Salvail's Cascade protocol is proved to be modifiable so as to reduce the hardware implementation cost while still maintaining adequate correction rate and tolerable leaked information during the reconciliation phase. Finally, as for the privacy amplification phase, the work on low-cost universal hash functions from Yuumlksel is pointed out, achieving to allege that public discussion under noisy environment might be an interesting possibility for low cost RFID tags</description><identifier>ISSN: 0018-9448</identifier><identifier>EISSN: 1557-9654</identifier><identifier>DOI: 10.1109/TIT.2006.878219</identifier><identifier>CODEN: IETTAW</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Amplification ; Applied sciences ; Channels ; Circuit noise ; Costs ; Cryptographic protocols ; Cryptography ; Data communications ; Distillation ; Exact sciences and technology ; Hardware ; Information theory ; Information, signal and communications theory ; Lightweight cryptography ; noisy environment ; Passive RFID tags ; Privacy ; Protocol ; public discussion protocols ; Radio frequency identification ; Radiofrequency identification ; Radiolocalization and radionavigation ; Readers ; RFID ; RFID tags ; secret-key exchange ; Signal and communications theory ; Tags ; Telecommunications ; Telecommunications and information theory ; Working environment noise</subject><ispartof>IEEE transactions on information theory, 2006-08, Vol.52 (8), p.3562-3566</ispartof><rights>2006 INIST-CNRS</rights><rights>Copyright Institute of Electrical and Electronics Engineers, Inc. (IEEE) Aug 2006</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c351t-3053bd02a19631ca696a7e4bd2b5d9a9c5d40d9b455bd374f9dc0005c71c947d3</citedby><cites>FETCH-LOGICAL-c351t-3053bd02a19631ca696a7e4bd2b5d9a9c5d40d9b455bd374f9dc0005c71c947d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1661835$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1661835$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17973813$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Chabanne, H.</creatorcontrib><creatorcontrib>Fumaroli, G.</creatorcontrib><title>Noisy Cryptographic Protocols for Low-Cost RFID Tags</title><title>IEEE transactions on information theory</title><addtitle>TIT</addtitle><description>Considering some passive eavesdropper, the feasibility of exchanging some secret data between an RFID tag and its reader through public discussion is established. No key distribution is required by our solution; the tag and the reader do not have to share any common data to form a confidential channel. For this, a natural phenomenon-the inherent noise on their communication link-is exploited. Classical protocols, consisting after an initialization step in three phases called advantage distillation, information reconciliation and privacy amplification, are then adapted to these highly constrained devices. First, the canvas of our study is presented. Next, the advantage distillation phase is discussed. Then, Brassard and Salvail's Cascade protocol is proved to be modifiable so as to reduce the hardware implementation cost while still maintaining adequate correction rate and tolerable leaked information during the reconciliation phase. Finally, as for the privacy amplification phase, the work on low-cost universal hash functions from Yuumlksel is pointed out, achieving to allege that public discussion under noisy environment might be an interesting possibility for low cost RFID tags</description><subject>Amplification</subject><subject>Applied sciences</subject><subject>Channels</subject><subject>Circuit noise</subject><subject>Costs</subject><subject>Cryptographic protocols</subject><subject>Cryptography</subject><subject>Data communications</subject><subject>Distillation</subject><subject>Exact sciences and technology</subject><subject>Hardware</subject><subject>Information theory</subject><subject>Information, signal and communications theory</subject><subject>Lightweight cryptography</subject><subject>noisy environment</subject><subject>Passive RFID tags</subject><subject>Privacy</subject><subject>Protocol</subject><subject>public discussion protocols</subject><subject>Radio frequency identification</subject><subject>Radiofrequency identification</subject><subject>Radiolocalization and radionavigation</subject><subject>Readers</subject><subject>RFID</subject><subject>RFID tags</subject><subject>secret-key exchange</subject><subject>Signal and communications theory</subject><subject>Tags</subject><subject>Telecommunications</subject><subject>Telecommunications and information theory</subject><subject>Working environment noise</subject><issn>0018-9448</issn><issn>1557-9654</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2006</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkMFLwzAUh4MoOKdnD16KIHjpltckTXOU6XQwVKSeQ5qks6NbatIh--_N6EDw9Hi87_fj8SF0DXgCgMW0XJSTDON8UvAiA3GCRsAYT0XO6CkaYQxFKigtztFFCOu4UgbZCNFX14R9MvP7rncrr7qvRifv3vVOuzYktfPJ0v2kMxf65GO-eExKtQqX6KxWbbBXxzlGn_OncvaSLt-eF7OHZaoJgz4lmJHK4EyByAlolYtccUsrk1XMCCU0MxQbUVHGKkM4rYXRGGOmOWhBuSFjdD_0dt5972zo5aYJ2rat2lq3CxIwgUxwGucY3f5D127nt_E7CYIJwAUXEZoOkPYuBG9r2flmo_w-NsmDRBklyoNEOUiMibtjrQpatbVXW92EvxgXnBRAInczcI219u-c51AQRn4B31V3uQ</recordid><startdate>20060801</startdate><enddate>20060801</enddate><creator>Chabanne, H.</creator><creator>Fumaroli, G.</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20060801</creationdate><title>Noisy Cryptographic Protocols for Low-Cost RFID Tags</title><author>Chabanne, H. ; Fumaroli, G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c351t-3053bd02a19631ca696a7e4bd2b5d9a9c5d40d9b455bd374f9dc0005c71c947d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Amplification</topic><topic>Applied sciences</topic><topic>Channels</topic><topic>Circuit noise</topic><topic>Costs</topic><topic>Cryptographic protocols</topic><topic>Cryptography</topic><topic>Data communications</topic><topic>Distillation</topic><topic>Exact sciences and technology</topic><topic>Hardware</topic><topic>Information theory</topic><topic>Information, signal and communications theory</topic><topic>Lightweight cryptography</topic><topic>noisy environment</topic><topic>Passive RFID tags</topic><topic>Privacy</topic><topic>Protocol</topic><topic>public discussion protocols</topic><topic>Radio frequency identification</topic><topic>Radiofrequency identification</topic><topic>Radiolocalization and radionavigation</topic><topic>Readers</topic><topic>RFID</topic><topic>RFID tags</topic><topic>secret-key exchange</topic><topic>Signal and communications theory</topic><topic>Tags</topic><topic>Telecommunications</topic><topic>Telecommunications and information theory</topic><topic>Working environment noise</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chabanne, H.</creatorcontrib><creatorcontrib>Fumaroli, G.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on information theory</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chabanne, H.</au><au>Fumaroli, G.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Noisy Cryptographic Protocols for Low-Cost RFID Tags</atitle><jtitle>IEEE transactions on information theory</jtitle><stitle>TIT</stitle><date>2006-08-01</date><risdate>2006</risdate><volume>52</volume><issue>8</issue><spage>3562</spage><epage>3566</epage><pages>3562-3566</pages><issn>0018-9448</issn><eissn>1557-9654</eissn><coden>IETTAW</coden><abstract>Considering some passive eavesdropper, the feasibility of exchanging some secret data between an RFID tag and its reader through public discussion is established. No key distribution is required by our solution; the tag and the reader do not have to share any common data to form a confidential channel. For this, a natural phenomenon-the inherent noise on their communication link-is exploited. Classical protocols, consisting after an initialization step in three phases called advantage distillation, information reconciliation and privacy amplification, are then adapted to these highly constrained devices. First, the canvas of our study is presented. Next, the advantage distillation phase is discussed. Then, Brassard and Salvail's Cascade protocol is proved to be modifiable so as to reduce the hardware implementation cost while still maintaining adequate correction rate and tolerable leaked information during the reconciliation phase. Finally, as for the privacy amplification phase, the work on low-cost universal hash functions from Yuumlksel is pointed out, achieving to allege that public discussion under noisy environment might be an interesting possibility for low cost RFID tags</abstract><cop>New York, NY</cop><pub>IEEE</pub><doi>10.1109/TIT.2006.878219</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0018-9448 |
ispartof | IEEE transactions on information theory, 2006-08, Vol.52 (8), p.3562-3566 |
issn | 0018-9448 1557-9654 |
language | eng |
recordid | cdi_proquest_journals_195910879 |
source | IEEE Electronic Library (IEL) |
subjects | Amplification Applied sciences Channels Circuit noise Costs Cryptographic protocols Cryptography Data communications Distillation Exact sciences and technology Hardware Information theory Information, signal and communications theory Lightweight cryptography noisy environment Passive RFID tags Privacy Protocol public discussion protocols Radio frequency identification Radiofrequency identification Radiolocalization and radionavigation Readers RFID RFID tags secret-key exchange Signal and communications theory Tags Telecommunications Telecommunications and information theory Working environment noise |
title | Noisy Cryptographic Protocols for Low-Cost RFID Tags |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T17%3A53%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Noisy%20Cryptographic%20Protocols%20for%20Low-Cost%20RFID%20Tags&rft.jtitle=IEEE%20transactions%20on%20information%20theory&rft.au=Chabanne,%20H.&rft.date=2006-08-01&rft.volume=52&rft.issue=8&rft.spage=3562&rft.epage=3566&rft.pages=3562-3566&rft.issn=0018-9448&rft.eissn=1557-9654&rft.coden=IETTAW&rft_id=info:doi/10.1109/TIT.2006.878219&rft_dat=%3Cproquest_RIE%3E1146127121%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=195910879&rft_id=info:pmid/&rft_ieee_id=1661835&rfr_iscdi=true |