TY - GEN
T1 - A lattice based authentication for low-cost RFID
AU - El Moustaine, Ethmane
AU - Laurent, Maryline
PY - 2012/12/1
Y1 - 2012/12/1
N2 - Security and privacy are major threats for the RFID technology today. First, the RFID passive tags prevailing in most of the RFID applications are very limited in processing power, so they cannot perform complex computations. Second, there are no RFID authentication protocols that can support both scalability and privacy at low complexity cost. In this paper, we present an adaptation of NTRU public cryptosystem for low-cost RFID tags and new efficient asymmetrical challenge/response RFID mutual authentication protocol for low-cost RFID systems based on this NTRU's adaptation. Thanks to properties of the polynomial ring in which NTRU operates we have ensured that the tag encrypts challenges using only addition and right circular shifts. The proposed authentication protocol guarantees privacy, high scalability level and low implementation complexity. It takes advantages of NTRU and HMAC features, and is resistant to all the classical security attacks including replays, tracking, man in the middle attacks, etc.
AB - Security and privacy are major threats for the RFID technology today. First, the RFID passive tags prevailing in most of the RFID applications are very limited in processing power, so they cannot perform complex computations. Second, there are no RFID authentication protocols that can support both scalability and privacy at low complexity cost. In this paper, we present an adaptation of NTRU public cryptosystem for low-cost RFID tags and new efficient asymmetrical challenge/response RFID mutual authentication protocol for low-cost RFID systems based on this NTRU's adaptation. Thanks to properties of the polynomial ring in which NTRU operates we have ensured that the tag encrypts challenges using only addition and right circular shifts. The proposed authentication protocol guarantees privacy, high scalability level and low implementation complexity. It takes advantages of NTRU and HMAC features, and is resistant to all the classical security attacks including replays, tracking, man in the middle attacks, etc.
KW - Lightweight Cryptography
KW - Mutual authentication
KW - NTRU public key cryptosystem
KW - Privacy
KW - RFID
KW - Scalability
KW - Security
U2 - 10.1109/RFID-TA.2012.6404569
DO - 10.1109/RFID-TA.2012.6404569
M3 - Conference contribution
AN - SCOPUS:84873166867
SN - 9781467346566
T3 - 2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012
SP - 68
EP - 73
BT - 2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012
T2 - 2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012
Y2 - 5 November 2012 through 7 November 2012
ER -