Sciweavers

Share
RFIDSEC
2010

Optimal Security Limits of RFID Distance Bounding Protocols

8 years 7 months ago
Optimal Security Limits of RFID Distance Bounding Protocols
Abstract. In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two specific classes, leaving the security bounds for the general case as an open problem. As for the classification, we introduce the notion of k-previous challenge dependent (k-PCD) protocols where each response bit depends on the current and k-previous challenges and there is no final signature. We treat the case k = 0, which means each response bit depends only on the current challenge, as a special case and define such protocols as current challenge dependent (CCD) protocols. In general, we construct a trade-off curve between the security levels of mafia and distance frauds by introducing two generic attack algorithms. This leads to the conclusion that CCD protocols cannot attain the ideal security against distance fraud, i.e. 1/2, for each challenge-response bit, without totally losing the security aga...
Orhun Kara, Süleyman Kardas, Muhammed Ali Bin
Added 30 Jan 2011
Updated 30 Jan 2011
Type Journal
Year 2010
Where RFIDSEC
Authors Orhun Kara, Süleyman Kardas, Muhammed Ali Bingöl, Gildas Avoine
Comments (0)
books