Two attacks against the Ff RFID protocol

0Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper investigates a new family of RFID protocols called Ff that grew out of a proposal made at ESORICS 2007. This family has the property of having highly efficient implementations and simultaneously providing some security arguments which shares some features with the HB protocol family. In this work, we exhibit links between the Ff protocol and the LPN problem, and demonstrate two attacks against the Ff family of protocols which run with a time complexity of about 252 and 2 38 respectively against the instance proposed by the designers that has a 512-bit secret key. Our two attacks have the nice property that they only require interactions with the tag alone and does not involve the reader. © 2009 Springer-Verlag.

Cite

CITATION STYLE

APA

Billet, O., & Elkhiyaoui, K. (2009). Two attacks against the Ff RFID protocol. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5922 LNCS, pp. 308–320). https://doi.org/10.1007/978-3-642-10628-6_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free