{"title":"基于栅格的低成本RFID认证","authors":"Ethmane El Moustaine, M. Laurent-Maknavicius","doi":"10.1109/RFID-TA.2012.6404569","DOIUrl":null,"url":null,"abstract":"Security and privacy are major threats for the RFID technology today. First, the RFID passive tags prevailing in most of the RFID applications are very limited in processing power, so they cannot perform complex computations. Second, there are no RFID authentication protocols that can support both scalability and privacy at low complexity cost. In this paper, we present an adaptation of NTRU public cryptosystem for low-cost RFID tags and new efficient asymmetrical challenge/response RFID mutual authentication protocol for low-cost RFID systems based on this NTRU's adaptation. Thanks to properties of the polynomial ring in which NTRU operates we have ensured that the tag encrypts challenges using only addition and right circular shifts. The proposed authentication protocol guarantees privacy, high scalability level and low implementation complexity. It takes advantages of NTRU and HMAC features, and is resistant to all the classical security attacks including replays, tracking, man in the middle attacks, etc.","PeriodicalId":232862,"journal":{"name":"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"11 7","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":"{\"title\":\"A lattice based authentication for low-cost RFID\",\"authors\":\"Ethmane El Moustaine, M. Laurent-Maknavicius\",\"doi\":\"10.1109/RFID-TA.2012.6404569\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security and privacy are major threats for the RFID technology today. First, the RFID passive tags prevailing in most of the RFID applications are very limited in processing power, so they cannot perform complex computations. Second, there are no RFID authentication protocols that can support both scalability and privacy at low complexity cost. In this paper, we present an adaptation of NTRU public cryptosystem for low-cost RFID tags and new efficient asymmetrical challenge/response RFID mutual authentication protocol for low-cost RFID systems based on this NTRU's adaptation. Thanks to properties of the polynomial ring in which NTRU operates we have ensured that the tag encrypts challenges using only addition and right circular shifts. The proposed authentication protocol guarantees privacy, high scalability level and low implementation complexity. It takes advantages of NTRU and HMAC features, and is resistant to all the classical security attacks including replays, tracking, man in the middle attacks, etc.\",\"PeriodicalId\":232862,\"journal\":{\"name\":\"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)\",\"volume\":\"11 7\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"19\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RFID-TA.2012.6404569\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RFID-TA.2012.6404569","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security and privacy are major threats for the RFID technology today. First, the RFID passive tags prevailing in most of the RFID applications are very limited in processing power, so they cannot perform complex computations. Second, there are no RFID authentication protocols that can support both scalability and privacy at low complexity cost. In this paper, we present an adaptation of NTRU public cryptosystem for low-cost RFID tags and new efficient asymmetrical challenge/response RFID mutual authentication protocol for low-cost RFID systems based on this NTRU's adaptation. Thanks to properties of the polynomial ring in which NTRU operates we have ensured that the tag encrypts challenges using only addition and right circular shifts. The proposed authentication protocol guarantees privacy, high scalability level and low implementation complexity. It takes advantages of NTRU and HMAC features, and is resistant to all the classical security attacks including replays, tracking, man in the middle attacks, etc.