A Salient Missing Link in RFID Security Protocols

In side channel analysis, an attacker utilizes some legitimate function queries in order to collect the corresponding responses of a cryptographic system while it is functioning in a normal mode. If those responses reveal some unwanted information about the secrecy or privacy, this leakage is called side channel information and these responses are called side channels. In this respect, careless deployments of "Secure" RFID authentication protocols are not exceptions and subject to side channel attacks.

Provided by: Bogazici University Topic: Mobility Date Added: Feb 2011 Format: PDF

Find By Topic