Cryptography in radio frequency identification and fair exchange protocols

作者: Gildas Avoine

DOI: 10.5075/EPFL-THESIS-3407

关键词:

摘要: This PhD thesis focuses on fair exchange protocols and radio frequency identification protocols. Fair stems from a daily life problem: how can two people objects (material or immaterial) fairly, that is, without anyone being hurt in the exchange? More formally, if Alice Bob each have mA mB respectively, then is if, at end of protocol, both received neither nor expected information, even partially. Ensuring fairness an impossible introducing additional assumptions. Thus, we propose approaches to overcome this problem. The first consists attaching person, guardian angel, security module conceived by trustworthy authority whose behavior cannot deviate established rules. In such model, be ensured with probability as close 1 desired, implying however communication complexity cost. We use results distributed algorithm generalize approach for n people. Finally, second no more considering isolated manner, but replace it its context, heart network, where person pair has few honest neighbors. framework, lie these neighbors, who are solicited only case conflict during exchange. look into Radio Frequency Identification (RFID), which remotely identifying subjects having transponder. great achievements made today, lies essentially willingness develop low cost small size transponders. Consequently, they limited computation storage capabilities. Due reason, many questions been asked regarding RFID's potential limitations, precisely terms privacy. Since recent problem, works presented document outline completely framework certain basic concepts. particular, present classify threats, show link between traceability analyze existing RFID also issues due key management. solution proposed Molnar Wagner weaknesses another based time-memory trade-offs. continue our trade-off analysis proposing method checkpoints, allows detecting false alarms probabilistic manner.

参考文章(132)
Jean-Paul Delescaille, Jean-Jacques Quisquater, How Easy is Collision Search? Application to DES (Extended Summary). theory and application of cryptographic techniques. pp. 429- 434 ,(1989)
J Park, K Ren, Kwangjo Kim, J Yang, H Lee, Mutual Authentication Protocol for Low-cost RFID international cryptology conference. pp. 17- 24 ,(2005)
Deirdre Mulligan, Nathan Good, Laura Quilter, John Han, Jennifer Urban, Elizabeth Miles, David Wagner, David Molnar, Radio Frequency Identification and Privacy with Information Goods ,(2004)
Tsutomu Matsumoto, Il Jun Kim, Achieving higher success probability in time-memory trade-off crypt analysis without increasing memory size IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. ,vol. 82, pp. 123- 129 ,(1999)
Xiaolan Zhang, Brian King, Integrity improvements to an RFID privacy protection protocol for anti-counterfeiting international conference on information security. pp. 474- 481 ,(2005) , 10.1007/11556992_34
Philippe Golle, Markus Jakobsson, Ari Juels, Paul Syverson, Universal Re-encryption for Mixnets the cryptographers’ track at the rsa conference. pp. 163- 178 ,(2004) , 10.1007/978-3-540-24660-2_14
Kenneth P. Fishkin, Sumit Roy, Bing Jiang, Some methods for privacy in RFID communication security of ad hoc and sensor networks. pp. 42- 53 ,(2004) , 10.1007/978-3-540-30496-8_5
Marko Vukolic, Rachid Guerraoui, Felix Freiling, Gildas Avoine, Modern Security with Traditional Distributed Algorithms Workshop on Secure Multiparty Protocols (SMP 2004). ,(2004)
Thomas Hjorth, Supporting Privacy in RFID Systems Department of Informatics and Mathematical Modeling, Technical University of Denmark, DTU : DK-2800 Kgs. Lyngby, Denmark. ,(2004)