Algebraic Replay Attacks on Authentication in RFID Protocols.
Noureddine ChikoucheCherif FoudilMohamed BenmohammedPublished in: SecNet (2013)
Keyphrases
- authentication protocol
- security protocols
- rfid tags
- mutual authentication
- security mechanisms
- cryptographic protocols
- rfid systems
- security services
- authentication scheme
- security analysis
- security flaws
- radio frequency identification
- key distribution
- low cost
- semi fragile watermarking
- security issues
- anti collision
- security problems
- user authentication
- radio frequency identification rfid
- secure communication
- rfid reader
- rfid technology
- privacy protection
- security requirements
- public key
- security properties
- access control
- resource constrained
- secret key
- countermeasures
- trusted third party
- private key
- lightweight
- smart card
- digital watermarking
- image authentication
- supply chain
- watermarking scheme
- detect malicious
- watermarking algorithm
- biometric template
- information security
- data collection
- digital images