Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware

Author(s):  
Yong Ki Lee ◽  
Lejla Batina ◽  
Dave Singelee ◽  
Bart Preneel ◽  
Ingrid Verbauwhede
2019 ◽  
Vol 2019 ◽  
pp. 1-10
Author(s):  
Jingang Liu ◽  
Yongge Wang ◽  
Zongxiang Yi ◽  
Zhiqiang Lin

Security challenges brought about by the upcoming 5G era should be taken seriously. Code-based cryptography leverages difficult problems in coding theory and is one of the main techniques enabling cryptographic primitives in the postquantum scenario. In this work, we propose the first efficient secure scheme based on polar codes (i.e., polarRLCE) which is inspired by the RLCE scheme, a candidate for the NIST postquantum cryptography standardization in the first round. In addition to avoiding some weaknesses of the RLCE scheme, we show that, with the proper choice of parameters, using polar codes, it is possible to design an encryption scheme to achieve the intended security level while retaining a reasonably small public key size. In addition, we also present a KEM version of the polarRLCE scheme that can attain a negligible decryption failure rate within the corresponding security parameters. It is shown that our proposal enjoys an apparent advantage to decrease the public key size, especially on the high-security level.


Author(s):  
Behzad Malek

In this chapter, the author briefly reviews the various attacks on existing identification and authentication schemes and describes the challenges in their design for RFID systems. The chapter categorizes the RFID identification and authentication schemes into two general categories: cryptographic and non-cryptographic solutions. Cryptographic solutions are based on symmetric or asymmetric cryptography systems. Depending on the resources available on the RFID tags, algorithms based on standard cryptography cannot be utilized in an RFID system and new cryptographic algorithms must be designed. However, there remain security challenges in protecting the RFID systems that cannot be solved solely by relying on cryptographic solutions. The chapter also reviews these challenges and looks at the countermeasures based on non-cryptographic solutions that would further protect RFID systems.


To ensure digital security and protection, it is basic to structure security and handy open key encryption plans. Today, huge information and distributed computing bring uncommon open doors as well as essential security challenges. Enormous information faces numerous security chances in the assortment, stockpiling, and utilization of information and brings major issues with respect to the revelation of private client information. It is trying to accomplish security and security assurance in the enormous information condition. Accordingly, to satisfy the developing need of open key encryption in this condition, we proposed a solitary piece open key encryption plot dependent on a variation of learning equality with commotion (LPN) and stretched out it to a multi-bit open key encryption conspire. We demonstrated the accuracy and picked plaintext assault security of the proposed technique. Our plans tackled encoding mistake rate issues of the current open key plans dependent on LPN, and the encoding blunder rate in our plans is immaterial. To meet the growing demand on security and privacy. It has been designed according to the basics of server and appropriated processing cryptographic techniques. Therefore the rate of data encryption is so sensitive and to be used as per the regulations of the algorithms that has been used within the rate of enormous information that has been used. With the use of data encryption gives the data utilisation giving some sort of difficult tasks which are to be further to be used as per required requirements. With the consideration of the large information condition different plans have been considered.


2015 ◽  
Vol 4 (1) ◽  
pp. 73-82 ◽  
Author(s):  
Chandrashekhar Meshram

Shamir proposed the concept of the ID-based cryptosystem (IBC) in 1984. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to choose his name or network address as his public key. This is advantageous to public-key cryptosystems because the public-key verification is so easy and direct. In such a way, a large public key file is not required. Since new cryptographic schemes always face security challenges and many integer factorization problem and discrete logarithm based cryptographic systems have been deployed, therefore, the purpose of this paper is to design practical IBC using hybrid mode problems factoring and discrete logarithm. We consider the security against a conspiracy of some entities in the proposed system and show the possibility of establishing a more secure system.


2013 ◽  
pp. 1682-1704 ◽  
Author(s):  
Behzad Malek ◽  
Ali Miri

In this chapter, the author briefly reviews the various attacks on existing identification and authentication schemes and describes the challenges in their design for RFID systems. The chapter categorizes the RFID identification and authentication schemes into two general categories: cryptographic and non-cryptographic solutions. Cryptographic solutions are based on symmetric or asymmetric cryptography systems. Depending on the resources available on the RFID tags, algorithms based on standard cryptography cannot be utilized in an RFID system and new cryptographic algorithms must be designed. However, there remain security challenges in protecting the RFID systems that cannot be solved solely by relying on cryptographic solutions. The chapter also reviews these challenges and looks at the countermeasures based on non-cryptographic solutions that would further protect RFID systems.


Informatica ◽  
2012 ◽  
Vol 23 (4) ◽  
pp. 537-562 ◽  
Author(s):  
Ting-Yi Chang ◽  
Min-Shiang Hwang ◽  
Wei-Pang Yang

Sign in / Sign up

Export Citation Format

Share Document