RFID Authentication Protocols Based on Error-Correcting Codes: A Survey

被引:0
|
作者
Noureddine Chikouche
Foudil Cherif
Pierre-Louis Cayrel
Mohamed Benmohammed
机构
[1] University of M’sila,Computer Science Department
[2] University of Biskra,LESIA Laboratory, Computer Science Department
[3] Laboratoire Hubert Curien,LIRE Laboratory
[4] UMR CNRS 5516,undefined
[5] University of Constantine 2,undefined
来源
关键词
RFID; Error-correcting codes; Authentication protocols; Vulnerabilities;
D O I
暂无
中图分类号
学科分类号
摘要
Code-based cryptography is a very promising research area. It allows the construction of different cryptographic mechanisms (e.g. identification protocol, public-key cryptosystem, etc.). McEliece cryptosystem is the first code-based public-key cryptosystem; several variants of this cryptosystem were proposed to design various security protocols in different systems. In this paper, we present a survey on various and recent authentication protocols in radio frequency identification systems which use diverse variants of the McEliece cryptosystem. Moreover, we discuss the security and the performance of each presented protocol.
引用
收藏
页码:509 / 527
页数:18
相关论文
共 50 条
  • [1] RFID Authentication Protocols Based on Error-Correcting Codes: A Survey
    Chikouche, Noureddine
    Cherif, Foudil
    Cayrel, Pierre-Louis
    Benmohammed, Mohamed
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 509 - 527
  • [2] Authentication Codes from Error-Correcting Codes; An Overview
    van Tilborg, Henk
    [J]. ENHANCING CRYPTOGRAPHIC PRIMITIVES WITH TECHNIQUES FROM ERROR CORRECTING CODES, 2009, 23 : 3 - 16
  • [3] ERROR-CORRECTING CODES FOR AUTHENTICATION AND SUBLIMINAL CHANNELS
    SAFAVINAINI, RS
    SEBERRY, JR
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1991, 37 (01) : 13 - 17
  • [4] On the cardinality of systematic authentication codes via error-correcting codes
    Kabatianskii, GA
    Smeets, B
    Johansson, T
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1996, 42 (02) : 566 - 578
  • [5] Authenticated Error-Correcting Codes with Applications to Multicast Authentication
    Lysyanskaya, Anna
    Tamassia, Roberto
    Triandopoulos, Nikos
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (02)
  • [6] A note on error-correcting codes for authentication and subliminal channels
    Yang, CN
    Laih, CS
    [J]. INFORMATION PROCESSING LETTERS, 1997, 62 (03) : 141 - 143
  • [7] Error-correcting codes based on quasigroups
    Gligoroski, Danilo
    Markovski, Smile
    Kocarev, Ljupco
    [J]. PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 165 - +
  • [8] ERROR-CORRECTING CODES
    LACHAUD, G
    VLADUT, S
    [J]. RECHERCHE, 1995, 26 (278): : 778 - 782
  • [9] ERROR-CORRECTING CODES
    PETERSON, WW
    [J]. SCIENTIFIC AMERICAN, 1962, 206 (02) : 96 - &
  • [10] Post-Quantum Message Authentication Cryptography Based on Error-Correcting Codes
    Gorbenko, Yuriy
    Svatovskiy, Igor
    Shevtsov, Oleksiy
    [J]. 2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 51 - 54