Security Analysis of RAPP An RFID Authentication Protocol based on Permutation.
Shaohui WangZhijie HanSujuan LiuDan-wei ChenPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- authentication protocol
- security analysis
- mutual authentication
- rfid systems
- public key
- smart card
- rfid tags
- user authentication
- authentication scheme
- security requirements
- key distribution
- security properties
- key exchange
- encryption scheme
- lightweight
- radio frequency identification
- low cost
- secret key
- computer systems
- similarity search
- cryptographic protocols
- diffie hellman
- trusted third party