LMAP : A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags

Low-cost Radio Frequency Identification (RFID) tags are devices of very limited computational capabilities, where only 250-3K logic gates can be devoted to security-related tasks. Many proposals have recently appeared, but all of them are based on RFID tags using classical cryptographic primitives such as PRNGs, hash functions, block ciphers, etc. We believe this assumption to be fairly unrealistic, as classical cryptographic constructions lie well beyond the computational reach of these constrained systems. A new approach is necessary to tackle this problem, so we propose a real lightweight mutual authentication protocol for low-cost RFID tags that offers an adequate security level and can be implemented even in the most limited systems, as it only needs around 300 gates.

[1]  Suresh Chari,et al.  A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards , 1999 .

[2]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[3]  G. Marsaglia,et al.  Some Difficult-to-pass Tests of Randomness , 2022 .

[4]  István Vajda,et al.  Lightweight Authentication Protocols for Low-Cost RFID Tags , 2003 .

[5]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[6]  Paul Müller,et al.  Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[7]  Berk Sunar,et al.  Universal Hash Functions for Emerging Ultra-Low-Power Networks , 2004 .

[8]  Ari Juels,et al.  Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.

[9]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[10]  Stephen A. Weis Security parallels between people and pervasive devices , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[11]  Tassos Dimitriou,et al.  A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[12]  Ari Juels,et al.  Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.

[13]  François-Xavier Standaert,et al.  State of the Art in Hardware Architectures , 2005 .

[14]  Matthew J. B. Robshaw,et al.  An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .

[15]  Dong Hoon Lee,et al.  Efficient RFID Authentication Protocol for Ubiquitous Computing Environment , 2005, EUC Workshops.

[16]  Vincent Rijmen,et al.  AES implementation on a grain of sand , 2005 .

[17]  Kwangjo Kim,et al.  Mutual Authentication Protocol for Low-cost RFID , 2005, CRYPTO 2005.

[18]  Christoph Ruland,et al.  Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags , 2006, CARDIS.