Upgrade to Pro — share decks privately, control downloads, hide ads and more …

RFID by wakemecn

wakemecn
August 22, 2012

RFID by wakemecn

Shandong University

wakemecn

August 22, 2012
Tweet

Other Decks in Technology

Transcript

  1. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    SASI:A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity Junwei Wang [email protected] August 22, 2012 Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  2. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Outline 1 Overview of RFID Definition, Application, Elements, etc. Security Previous Work 2 SASI:A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity Introduction Basic Ideas Evaluation Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  3. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Outline 1 Overview of RFID Definition, Application, Elements, etc. Security Previous Work 2 SASI:A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity Introduction Basic Ideas Evaluation Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  4. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work What Is RFID? RFID And Its Application Definition à¿ ‘Æ+(Radio Frequency Identification, RFID)ûß/•( à¿ ‘€/( >û߯ƒ-ÛLùaÆ+ RFID”(A •Û: § .¡ F— þf† ¨iÆ+ 5P¤g2* „úzýêÄQÜ Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  5. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work What Is RFID? RFID And Its Application Definition à¿ ‘Æ+(Radio Frequency Identification, RFID)ûß/•( à¿ ‘€/( >û߯ƒ-ÛLùaÆ+ RFID”(A •Û: § .¡ F— þf† ¨iÆ+ 5P¤g2* „úzýêÄQÜ Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  6. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work What Is RFID? RFID And Its Application Definition à¿ ‘Æ+(Radio Frequency Identification, RFID)ûß/•( à¿ ‘€/( >û߯ƒ-ÛLùaÆ+ RFID”(A •Û: § .¡ F— þf† ¨iÆ+ 5P¤g2* „úzýêÄQÜ Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  7. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work What Is RFID? RFID And Its Application Definition à¿ ‘Æ+(Radio Frequency Identification, RFID)ûß/•( à¿ ‘€/( >û߯ƒ-ÛLùaÆ+ RFID”(A •Û: § .¡ F— þf† ¨iÆ+ 5P¤g2* „úzýêÄQÜ Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  8. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work What Is RFID? RFID And Its Application Definition à¿ ‘Æ+(Radio Frequency Identification, RFID)ûß/•( à¿ ‘€/( >û߯ƒ-ÛLùaÆ+ RFID”(A •Û: § .¡ F— þf† ¨iÆ+ 5P¤g2* „úzýêÄQÜ Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  9. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work What Is RFID? RFID And Its Application Definition à¿ ‘Æ+(Radio Frequency Identification, RFID)ûß/•( à¿ ‘€/( >û߯ƒ-ÛLùaÆ+ RFID”(A •Û: § .¡ F— þf† ¨iÆ+ 5P¤g2* „úzýêÄQÜ Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  10. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Elements RFIDûß , è „ : tag tag reader back-end database Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  11. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Elements RFIDûß , è „ : tag tag reader back-end database Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  12. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Elements RFIDûß , è „ : tag tag reader back-end database Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  13. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Communication Channel forward channel backward channel the channel between back-end database and tag reader Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  14. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Communication Channel forward channel backward channel the channel between back-end database and tag reader Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  15. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Communication Channel forward channel backward channel the channel between back-end database and tag reader Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  16. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Limitation of Tags There are several limitation of tags. computation ability memory power, etc. Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  17. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Limitation of Tags There are several limitation of tags. computation ability memory power, etc. Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  18. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Limitation of Tags There are several limitation of tags. computation ability memory power, etc. Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  19. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Outline 1 Overview of RFID Definition, Application, Elements, etc. Security Previous Work 2 SASI:A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity Introduction Basic Ideas Evaluation Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  20. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Security Requirements Security requirements of RFID systems include: authentication content privacy access control anonymity and anti-tracking data recovery Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  21. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Security Requirements Security requirements of RFID systems include: authentication content privacy access control anonymity and anti-tracking data recovery Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  22. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Security Requirements Security requirements of RFID systems include: authentication content privacy access control anonymity and anti-tracking data recovery Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  23. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Security Requirements Security requirements of RFID systems include: authentication content privacy access control anonymity and anti-tracking data recovery Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  24. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Security Requirements Security requirements of RFID systems include: authentication content privacy access control anonymity and anti-tracking data recovery Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  25. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Security Policy physical ways kill}ä:6 Y5O= ;¨rp blocker tag Physical policies has many flaws. policies based on cryptographic policies based on both above Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  26. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Security Policy physical ways kill}ä:6 Y5O= ;¨rp blocker tag Physical policies has many flaws. policies based on cryptographic policies based on both above Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  27. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Security Policy physical ways kill}ä:6 Y5O= ;¨rp blocker tag Physical policies has many flaws. policies based on cryptographic policies based on both above Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  28. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Security Policy physical ways kill}ä:6 Y5O= ;¨rp blocker tag Physical policies has many flaws. policies based on cryptographic policies based on both above Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  29. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Security Policy physical ways kill}ä:6 Y5O= ;¨rp blocker tag Physical policies has many flaws. policies based on cryptographic policies based on both above Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  30. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Security Policy physical ways kill}ä:6 Y5O= ;¨rp blocker tag Physical policies has many flaws. policies based on cryptographic policies based on both above Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  31. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Security Policy physical ways kill}ä:6 Y5O= ;¨rp blocker tag Physical policies has many flaws. policies based on cryptographic policies based on both above Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  32. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Outline 1 Overview of RFID Definition, Application, Elements, etc. Security Previous Work 2 SASI:A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity Introduction Basic Ideas Evaluation Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  33. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Hash-Lock Protocol By Sarma S.E., etc. 2003 impersonation attacks and the replay attacks easy to tracking tags Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  34. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Hash-Lock Protocol By Sarma S.E., etc. 2003 impersonation attacks and the replay attacks easy to tracking tags Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  35. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Randomized Hash-Lock Protocol By Weis S.A., etc. 2004 impersonation attacks and the replay attacks easy to tracking tags large communication cost Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  36. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Randomized Hash-Lock Protocol By Weis S.A., etc. 2004 impersonation attacks and the replay attacks easy to tracking tags large communication cost Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  37. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Randomized Hash-Lock Protocol By Weis S.A., etc. 2004 impersonation attacks and the replay attacks easy to tracking tags large communication cost Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  38. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Hash-Chain Protocol By Ohkubo M., etc.2004 The jth authentication: only a tag reader recognizes tags the replay attacks and impersonation attacks large computation cost Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  39. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Hash-Chain Protocol By Ohkubo M., etc.2004 The jth authentication: only a tag reader recognizes tags the replay attacks and impersonation attacks large computation cost Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  40. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Hash-Chain Protocol By Ohkubo M., etc.2004 The jth authentication: only a tag reader recognizes tags the replay attacks and impersonation attacks large computation cost Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  41. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Other Protocols Hash-Base Varying Identification Protocol Henrici D., etc. 2004 RFID in Library Molnar D., etc. 2004 RFID System for Distributed Database Environment Rhee K., etc. 2005 LACP Lee S.M., etc. 2005 Re-encryption Systems Privacy Protection in RFID-enabled Banknotes. Juels A., etc. 2003 Universal Re-encryption for Mixnets. Colle P., etc. 2004 Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  42. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Other Protocols Hash-Base Varying Identification Protocol Henrici D., etc. 2004 RFID in Library Molnar D., etc. 2004 RFID System for Distributed Database Environment Rhee K., etc. 2005 LACP Lee S.M., etc. 2005 Re-encryption Systems Privacy Protection in RFID-enabled Banknotes. Juels A., etc. 2003 Universal Re-encryption for Mixnets. Colle P., etc. 2004 Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  43. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Other Protocols Hash-Base Varying Identification Protocol Henrici D., etc. 2004 RFID in Library Molnar D., etc. 2004 RFID System for Distributed Database Environment Rhee K., etc. 2005 LACP Lee S.M., etc. 2005 Re-encryption Systems Privacy Protection in RFID-enabled Banknotes. Juels A., etc. 2003 Universal Re-encryption for Mixnets. Colle P., etc. 2004 Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  44. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Other Protocols Hash-Base Varying Identification Protocol Henrici D., etc. 2004 RFID in Library Molnar D., etc. 2004 RFID System for Distributed Database Environment Rhee K., etc. 2005 LACP Lee S.M., etc. 2005 Re-encryption Systems Privacy Protection in RFID-enabled Banknotes. Juels A., etc. 2003 Universal Re-encryption for Mixnets. Colle P., etc. 2004 Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  45. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Other Protocols Hash-Base Varying Identification Protocol Henrici D., etc. 2004 RFID in Library Molnar D., etc. 2004 RFID System for Distributed Database Environment Rhee K., etc. 2005 LACP Lee S.M., etc. 2005 Re-encryption Systems Privacy Protection in RFID-enabled Banknotes. Juels A., etc. 2003 Universal Re-encryption for Mixnets. Colle P., etc. 2004 Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  46. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Other Protocols Hash-Base Varying Identification Protocol Henrici D., etc. 2004 RFID in Library Molnar D., etc. 2004 RFID System for Distributed Database Environment Rhee K., etc. 2005 LACP Lee S.M., etc. 2005 Re-encryption Systems Privacy Protection in RFID-enabled Banknotes. Juels A., etc. 2003 Universal Re-encryption for Mixnets. Colle P., etc. 2004 Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  47. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Definition, Application, Elements, etc. Security Previous Work Other Protocols Hash-Base Varying Identification Protocol Henrici D., etc. 2004 RFID in Library Molnar D., etc. 2004 RFID System for Distributed Database Environment Rhee K., etc. 2005 LACP Lee S.M., etc. 2005 Re-encryption Systems Privacy Protection in RFID-enabled Banknotes. Juels A., etc. 2003 Universal Re-encryption for Mixnets. Colle P., etc. 2004 Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  48. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Outline 1 Overview of RFID Definition, Application, Elements, etc. Security Previous Work 2 SASI:A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity Introduction Basic Ideas Evaluation Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  49. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Classification of RFID Authentication Protocols Based on the limitation of tags Based on the computational cost and the operations supported on tags, we roughly have four classes. full-fledged class simple lightweight ultralightweight Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  50. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Classification of RFID Authentication Protocols Based on the limitation of tags Based on the computational cost and the operations supported on tags, we roughly have four classes. full-fledged class simple lightweight ultralightweight Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  51. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Classification of RFID Authentication Protocols Based on the limitation of tags Based on the computational cost and the operations supported on tags, we roughly have four classes. full-fledged class simple lightweight ultralightweight Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  52. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Classification of RFID Authentication Protocols Based on the limitation of tags Based on the computational cost and the operations supported on tags, we roughly have four classes. full-fledged class simple lightweight ultralightweight Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  53. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Related Works We have talked about previous works before, this paper gives them a classification. Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  54. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Outline 1 Overview of RFID Definition, Application, Elements, etc. Security Previous Work 2 SASI:A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity Introduction Basic Ideas Evaluation Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  55. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Preliminaries Entities involved: tag, tag reader, back-end database Secure and insecure channels Each tag has a identification(ID), and two triples (IDS, K1 , K2 ), one is for old values and the other is for potential next values (IDS is a pseudonym for tag and all the ID/IDS/K1 /K2 is 96 bits) Back-end database keeps one of the these two triples. Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  56. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Preliminaries Entities involved: tag, tag reader, back-end database Secure and insecure channels Each tag has a identification(ID), and two triples (IDS, K1 , K2 ), one is for old values and the other is for potential next values (IDS is a pseudonym for tag and all the ID/IDS/K1 /K2 is 96 bits) Back-end database keeps one of the these two triples. Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  57. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Preliminaries Entities involved: tag, tag reader, back-end database Secure and insecure channels Each tag has a identification(ID), and two triples (IDS, K1 , K2 ), one is for old values and the other is for potential next values (IDS is a pseudonym for tag and all the ID/IDS/K1 /K2 is 96 bits) Back-end database keeps one of the these two triples. Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  58. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Preliminaries Entities involved: tag, tag reader, back-end database Secure and insecure channels Each tag has a identification(ID), and two triples (IDS, K1 , K2 ), one is for old values and the other is for potential next values (IDS is a pseudonym for tag and all the ID/IDS/K1 /K2 is 96 bits) Back-end database keeps one of the these two triples. Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  59. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Phases SASI has three phases: tag identification mutual identification pseudonym updating and key updating Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  60. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Phases SASI has three phases: tag identification mutual identification pseudonym updating and key updating Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  61. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Phases SASI has three phases: tag identification mutual identification pseudonym updating and key updating Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  62. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Tag Identification Initially, the tag reader sends "hello" to the tag, and tag responds with its "potential next" IDS. Tag Reader 1,”hello” − − − − − − − − − − 2,IDS Tag If the reader could find a matched entry in the database, it steps into the next phase; otherwise, it probes again and the tag responds with its old IDS. Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  63. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Mutual Authentication Tag Reader use IDS to find a matched record A = IDS ⊕ K1 ⊕ n1 B = (IDS ∨ K2) + n2 K1 = Rot(K1 ⊕ n2, K1) K2 = Rot(K2 ⊕ n1, K2) C = (K1 ⊕ K2) + (K1 ⊕ K2) Tag Reader A||B||C − − − − → Tag Compute and Verify D. Tag extract n1 from A, and n2 from B K1 = Rot(K1 ⊕ n2, K1) K2 = Rot(K2 ⊕ n1, K2) ˆ C = (K1 ⊕ K2) + (K1 ⊕ K2) Verify whether ˆ C = C or not, if yes, compute D and send. D = (K2+ID)⊕((K1⊕K2)∨K1) Tag Reader D ← − Tag Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  64. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Pseudonym Updating and Key updating Tag Reader IDS = (IDS +ID)⊕(n2 ⊕K1) K1 = K1 K2 = K2 Tag IDSold = IDS IDSnext = (IDS+ID)⊕(n2⊕K1) K1old = K1; K1next = K1 K2old = K2; K2next = K2 Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  65. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Outline 1 Overview of RFID Definition, Application, Elements, etc. Security Previous Work 2 SASI:A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity Introduction Basic Ideas Evaluation Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  66. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Security Analysis It is obvious, the tag and the tag reader can successfully authenticate each other, if only passive attacker is considered. Now we analysis the required properties and possible attacks. Mutual authentication and data integrity Tag anonymity and resistance to tracking Data confidentiality Forward security Explicit key confirmation and resistance to de-synchronization attack Resistance to replay attack Resistance to man-in-the-middle attack Resistance to disclosure attack Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  67. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Security Analysis It is obvious, the tag and the tag reader can successfully authenticate each other, if only passive attacker is considered. Now we analysis the required properties and possible attacks. Mutual authentication and data integrity Tag anonymity and resistance to tracking Data confidentiality Forward security Explicit key confirmation and resistance to de-synchronization attack Resistance to replay attack Resistance to man-in-the-middle attack Resistance to disclosure attack Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  68. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Security Analysis It is obvious, the tag and the tag reader can successfully authenticate each other, if only passive attacker is considered. Now we analysis the required properties and possible attacks. Mutual authentication and data integrity Tag anonymity and resistance to tracking Data confidentiality Forward security Explicit key confirmation and resistance to de-synchronization attack Resistance to replay attack Resistance to man-in-the-middle attack Resistance to disclosure attack Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  69. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Security Analysis It is obvious, the tag and the tag reader can successfully authenticate each other, if only passive attacker is considered. Now we analysis the required properties and possible attacks. Mutual authentication and data integrity Tag anonymity and resistance to tracking Data confidentiality Forward security Explicit key confirmation and resistance to de-synchronization attack Resistance to replay attack Resistance to man-in-the-middle attack Resistance to disclosure attack Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  70. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Security Analysis It is obvious, the tag and the tag reader can successfully authenticate each other, if only passive attacker is considered. Now we analysis the required properties and possible attacks. Mutual authentication and data integrity Tag anonymity and resistance to tracking Data confidentiality Forward security Explicit key confirmation and resistance to de-synchronization attack Resistance to replay attack Resistance to man-in-the-middle attack Resistance to disclosure attack Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  71. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Security Analysis It is obvious, the tag and the tag reader can successfully authenticate each other, if only passive attacker is considered. Now we analysis the required properties and possible attacks. Mutual authentication and data integrity Tag anonymity and resistance to tracking Data confidentiality Forward security Explicit key confirmation and resistance to de-synchronization attack Resistance to replay attack Resistance to man-in-the-middle attack Resistance to disclosure attack Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  72. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Security Analysis It is obvious, the tag and the tag reader can successfully authenticate each other, if only passive attacker is considered. Now we analysis the required properties and possible attacks. Mutual authentication and data integrity Tag anonymity and resistance to tracking Data confidentiality Forward security Explicit key confirmation and resistance to de-synchronization attack Resistance to replay attack Resistance to man-in-the-middle attack Resistance to disclosure attack Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  73. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Security Analysis It is obvious, the tag and the tag reader can successfully authenticate each other, if only passive attacker is considered. Now we analysis the required properties and possible attacks. Mutual authentication and data integrity Tag anonymity and resistance to tracking Data confidentiality Forward security Explicit key confirmation and resistance to de-synchronization attack Resistance to replay attack Resistance to man-in-the-middle attack Resistance to disclosure attack Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  74. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Performance Evaluation Only care about the tag Storage Requirement: Each tag requirements 96-bit ROM for static ID, and 96-bit×6 rewritable memory for two triples (IDS,K1 ,K2 ) Computation Cost: Bit-wise operations are very low-cost and can be effectively implemented on the very low-cost RFIDs, so we ignore the computation cost. Communication Cost: The tag and the reader transmit A||B||C and D, which in total demand 96-bit×4. Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  75. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Performance Evaluation Only care about the tag Storage Requirement: Each tag requirements 96-bit ROM for static ID, and 96-bit×6 rewritable memory for two triples (IDS,K1 ,K2 ) Computation Cost: Bit-wise operations are very low-cost and can be effectively implemented on the very low-cost RFIDs, so we ignore the computation cost. Communication Cost: The tag and the reader transmit A||B||C and D, which in total demand 96-bit×4. Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  76. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Introduction Basic Ideas Evaluation Performance Evaluation Only care about the tag Storage Requirement: Each tag requirements 96-bit ROM for static ID, and 96-bit×6 rewritable memory for two triples (IDS,K1 ,K2 ) Computation Cost: Bit-wise operations are very low-cost and can be effectively implemented on the very low-cost RFIDs, so we ignore the computation cost. Communication Cost: The tag and the reader transmit A||B||C and D, which in total demand 96-bit×4. Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  77. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Summary SASI requires only simple bit-wise operations. SASI provides strong authentication and strong integrity. SASI can withstand all possible attacks that break the security of previous schemes. Outlook More secure, more effective, more practical and lower-cost. Provable Security. Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  78. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Summary SASI requires only simple bit-wise operations. SASI provides strong authentication and strong integrity. SASI can withstand all possible attacks that break the security of previous schemes. Outlook More secure, more effective, more practical and lower-cost. Provable Security. Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  79. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Summary SASI requires only simple bit-wise operations. SASI provides strong authentication and strong integrity. SASI can withstand all possible attacks that break the security of previous schemes. Outlook More secure, more effective, more practical and lower-cost. Provable Security. Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  80. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Summary SASI requires only simple bit-wise operations. SASI provides strong authentication and strong integrity. SASI can withstand all possible attacks that break the security of previous schemes. Outlook More secure, more effective, more practical and lower-cost. Provable Security. Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  81. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Summary SASI requires only simple bit-wise operations. SASI provides strong authentication and strong integrity. SASI can withstand all possible attacks that break the security of previous schemes. Outlook More secure, more effective, more practical and lower-cost. Provable Security. Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  82. Overview of RFID SASI:A New Ultralightweight RFID Authentication Protocol Summary

    Summary SASI requires only simple bit-wise operations. SASI provides strong authentication and strong integrity. SASI can withstand all possible attacks that break the security of previous schemes. Outlook More secure, more effective, more practical and lower-cost. Provable Security. Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol
  83. Appendix For Further Reading For Further Reading h8Œ, ¯{ý. RFID‰hO®„¾¡

    Ä . ¡—:f¥, 29(4):581-589,2006. Hung-Yu Chien. SASI:A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. IEEE Transactions on Dependable and Secure Computing, 4(4):337–340, 2007. Junwei Wang [email protected] SASI:A New Ultraligthweight RFID Authentication Protocol