A FORWARD PRIVATE PROTOCOL BASED ON PRNG AND LPN FOR LOW-COST RFID

Xiaolin Cao, Maire O’Neill

2011

Abstract

Low-cost Radio Frequency IDentification (RFID) tags are extremely resource-constrained devices, therefore, difficult to defend against corruption attacks. Meanwhile, forward privacy considers how to preserve the privacy of compromised tags. The majority of existing authentication protocols uses cryptographic hash functions to preserve forward privacy under the random oracle model, but the expensive hardware cost of a cryptographic hash function exceeds the budget of low-cost tags. In this paper, a novel forward private protocol for low-cost RFID applications is proposed. It is composed of a pseudorandom number generator (PRNG) and a learning parity with noise (LPN) problem. In comparison to previous protocols, the proposed protocol achieves a high forward privacy level and requires a small hardware cost. The proofs of security, correctness and forward privacy for the proposed protocol are provided under the standard model.

References

  1. Table 1: Comparison Results 1.
  2. Table 1: Comparison Results 1.
  3. Cao, O'Neill, Le et al., 2011 2007
  4. Cao, O'Neill, Le et al., 2011 2007
  5. Table 2: Comparison Results 2. International Workshop on Pervasive Computing and Communication Security.
  6. Table 2: Comparison Results 2. International Workshop on Pervasive Computing and Communication Security.
  7. Berbain, C., Billet, O., Etrog, J. and Gilbert, H. 2009. An Efficient Forward Private RFID Protocol. ACM Conference on Computer and Communications Security (CCS).
  8. Berbain, C., Billet, O., Etrog, J. and Gilbert, H. 2009. An Efficient Forward Private RFID Protocol. ACM Conference on Computer and Communications Security (CCS).
  9. Billet, O., Etrog, J. and Gilbert, H. 2010. Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher. International Workshop on Fast Software Encryption (FSE)
  10. Billet, O., Etrog, J. and Gilbert, H. 2010. Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher. International Workshop on Fast Software Encryption (FSE)
  11. Cid, C. and Robshaw, M. 2009. The eSTREAM Portfolio 2009 Annual Update. Available from: http://www.ecrypt.eu.org/stream/.
  12. Cid, C. and Robshaw, M. 2009. The eSTREAM Portfolio 2009 Annual Update. Available from: http://www.ecrypt.eu.org/stream/.
  13. Cao, X. and O'Neill, M. 2011. F-HB: An Efficient Forward Private Protocol. Workshop on Lightweight Security & Privacy: Devices, Protocols and Applications (Lightsec2011).
  14. Cao, X. and O'Neill, M. 2011. F-HB: An Efficient Forward Private Protocol. Workshop on Lightweight Security & Privacy: Devices, Protocols and Applications (Lightsec2011).
  15. Gilbert, H., Robshaw, M. J. B. and Seurin, Y. 2008. HB#: Increasing the Security and Efficiency of HB+. Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT.
  16. Gilbert, H., Robshaw, M. J. B. and Seurin, Y. 2008. HB#: Increasing the Security and Efficiency of HB+. Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT.
  17. Hopper, N. J. and Blum, M. 2001. Secure Human Identification Protocols. International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT.
  18. Hopper, N. J. and Blum, M. 2001. Secure Human Identification Protocols. International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT.
  19. Juels, A. and Weis, S. A. 2005. Authenticating Pervasive Devices with Human Protocols. International Cryptology Conference, CRYPTO.
  20. Juels, A. and Weis, S. A. 2005. Authenticating Pervasive Devices with Human Protocols. International Cryptology Conference, CRYPTO.
  21. Juels, A. 2006. RFID Security and Privacy: A research Survey. IEEE Journal on Selected Areas in Communications.
  22. Juels, A. 2006. RFID Security and Privacy: A research Survey. IEEE Journal on Selected Areas in Communications.
  23. Katz, J. and Shin, J. S. 2006. Parallel and Concurrent Security of the HB and HB+ Protocols. Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT.
  24. Katz, J. and Shin, J. S. 2006. Parallel and Concurrent Security of the HB and HB+ Protocols. Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT.
  25. Le, T. V., Burmester, M. and de Medeiros, B. 2007. Universally Composable and Forward-secure RFID Authentication and Authenticated Key Exchange. ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS).
  26. Le, T. V., Burmester, M. and de Medeiros, B. 2007. Universally Composable and Forward-secure RFID Authentication and Authenticated Key Exchange. ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS).
  27. Ohkubo, M., Suzuki, K. and Kinoshita, S. 2003. Cryptographic Approach to Privacy-Friendly Tags. RFID Privacy Workshop.
  28. Ohkubo, M., Suzuki, K. and Kinoshita, S. 2003. Cryptographic Approach to Privacy-Friendly Tags. RFID Privacy Workshop.
Download


Paper Citation


in Harvard Style

Cao X. and O’Neill M. (2011). A FORWARD PRIVATE PROTOCOL BASED ON PRNG AND LPN FOR LOW-COST RFID . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 287-292. DOI: 10.5220/0003520802870292


in Harvard Style

Cao X. and O’Neill M. (2011). A FORWARD PRIVATE PROTOCOL BASED ON PRNG AND LPN FOR LOW-COST RFID . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 287-292. DOI: 10.5220/0003520802870292


in Bibtex Style

@conference{secrypt11,
author={Xiaolin Cao and Maire O’Neill},
title={A FORWARD PRIVATE PROTOCOL BASED ON PRNG AND LPN FOR LOW-COST RFID},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={287-292},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003520802870292},
isbn={978-989-8425-71-3},
}


in Bibtex Style

@conference{secrypt11,
author={Xiaolin Cao and Maire O’Neill},
title={A FORWARD PRIVATE PROTOCOL BASED ON PRNG AND LPN FOR LOW-COST RFID},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={287-292},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003520802870292},
isbn={978-989-8425-71-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - A FORWARD PRIVATE PROTOCOL BASED ON PRNG AND LPN FOR LOW-COST RFID
SN - 978-989-8425-71-3
AU - Cao X.
AU - O’Neill M.
PY - 2011
SP - 287
EP - 292
DO - 10.5220/0003520802870292


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - A FORWARD PRIVATE PROTOCOL BASED ON PRNG AND LPN FOR LOW-COST RFID
SN - 978-989-8425-71-3
AU - Cao X.
AU - O’Neill M.
PY - 2011
SP - 287
EP - 292
DO - 10.5220/0003520802870292