[Resource Topic] 2009/092: Reducing RFID Reader Load with the Meet-in-the-Middle Strategy

Welcome to the resource topic for 2009/092

Title:
Reducing RFID Reader Load with the Meet-in-the-Middle Strategy

Authors: Jung Hee Cheon, Jeongdae Hong, Gene Tsudik

Abstract:

In almost any RFID system, a reader needs to identify, and optionally authenticate, a multitude of tags. If each tag has a unique secret, identification and authentication are trivial, however, the reader (or a back-end server) needs to perform a brute-force search for each tag-reader interaction. In this paper, we suggest a simple, efficient and secure technique that reduces reader computation to O(\sqrt N \cdot \log N). Our technique is based on the well-known ``meet-in-the-middle’’ strategy used in the past to attack certain symmetric ciphers.

ePrint: https://eprint.iacr.org/2009/092

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .