Mobility

A Salient Missing Link in RFID Security Protocols

Download Now Free registration required

Executive Summary

In side channel analysis, an attacker utilizes some legitimate function queries in order to collect the corresponding responses of a cryptographic system while it is functioning in a normal mode. If those responses reveal some unwanted information about the secrecy or privacy, this leakage is called side channel information and these responses are called side channels. In this respect, careless deployments of "Secure" RFID authentication protocols are not exceptions and subject to side channel attacks.

  • Format: PDF
  • Size: 1147.8 KB