Burmester et al., 2011 - Google Patents
Lightweight RFID authentication with forward and backward securityBurmester et al., 2011
View PDF- Document ID
- 3010857933186286623
- Author
- Burmester M
- Munilla J
- Publication year
- Publication venue
- ACM Transactions on Information and System Security (TISSEC)
External Links
Snippet
We propose a lightweight RFID authentication protocol that supports forward and backward security. The only cryptographic mechanism that this protocol uses is a pseudorandom number generator (PRNG) that is shared with the backend Server. Authentication is …
- 230000001360 synchronised 0 description 12
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Burmester et al. | Lightweight RFID authentication with forward and backward security | |
Juels et al. | Authenticating pervasive devices with human protocols | |
Burmester et al. | Universally composable RFID identification and authentication protocols | |
Niu et al. | Privacy and authentication protocol for mobile RFID systems | |
Yilmaz et al. | ARMOR: An anti-counterfeit security Mechanism for lOw cost Radio frequency identification systems | |
Munilla et al. | Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments | |
Anandhi et al. | An authentication protocol to track an object with multiple RFID tags using cloud computing environment | |
Burmester et al. | A flyweight RFID authentication protocol | |
Hristea et al. | Destructive privacy and mutual authentication in Vaudenay’s RFID model | |
Shariq et al. | URASP: An ultralightweight RFID authentication scheme using permutation operation | |
Hristea et al. | A PUF-based destructive private mutual authentication RFID protocol | |
Tounsi et al. | KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems | |
Maurya et al. | Quadratic residue-based unilateral authentication protocol for RFID system | |
Li et al. | SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance | |
Gope et al. | QR-PUF: Design and implementation of a RFID-based secure inpatient management system using XOR-arbiter-PUF and QR-code | |
Yang et al. | A privacy model for RFID tag ownership transfer | |
Rostampour et al. | An authenticated encryption based grouping proof protocol for RFID systems | |
Moazami et al. | TBGODP^+ TBGODP+: improvement of TBGODP, a time bound group ownership delegation protocol | |
Chen et al. | A secure RFID authentication protocol adopting error correction code | |
Shi et al. | The Lightweight RFID Grouping‐Proof Protocols with Identity Authentication and Forward Security | |
Shariq et al. | Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing | |
Ren et al. | An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol. | |
Liang et al. | A novel lightweight PUF-based RFID mutual authentication protocol | |
Maarof et al. | Security analysis of low cost RFID systems | |
Munilla et al. | Enhanced ownership transfer protocol for RFID in an extended communication model |