Академический Документы
Профессиональный Документы
Культура Документы
Gene Tsudik
CS Department, University of California, Irvine
Email: gts AT ics.uci.edu
communication-intensive, much more so than storing all tag 2 The length of the update interval is a system-wide parame-
to identify the same tag by querying a candidate tag with a the reader needs to group responses according to the Tr value
timestamp slightly above the previous one. used.
Second, the protocol makes an implicit assumption total number of tags. Although, on the average, the
that a tag is never authenticated (interrogated) more server only needs to perform n/2 operations to identify
than once within the same interval. This has some the tag, the work is essentially wasted, i.e., it has no
bearing on the choice of the interval. A relatively short use for any other protocol sessions. Whereas, in our
interval (e.g., a second) makes the assumption realis- case, an ephemeral table is can be used for multiple
tic for many settings. However, it translates into heavy (as many as n) protocol sessions.
computational burden for the server, i.e., frequent com- The same issues arise when comparing YA-TRAP
putation of ephemeral tables. On the other hand, a with the recent work in [2], which represents the state-
longer interval (e.g., an hour) results in much lower of-the-art. Although the MSW protocol [2] is much
server burden, albeit, it may over-stretch our assump- more efficient than the naı̈ve scheme above, it requires
tion, since a tag may need to be interrogated more than the tag to store O(logn) keys and perform O(logn)
once per interval. One solution is to sacrifice some un- pseudo-random function (PRF) operations. YA-TRAP
traceability in favor of increased functionality, i.e., al- requires a single key on the tag and a single PRF.
low a tag to iterate over the same time value (accept As far as cost, our requirement for non-volatile RAM
Tr = Tt ) a fixed number of times, say k. This would elevate the cost above that of cheapest tags, i.e., less
entail storing an additional counter on the tag; once the than $0.10 per tag. In this sense, YA-TRAP is more
counter for the same Tt reaches k, the tag refuses to ac- expensive than the one of the MSW protocols which
cept Tr = Tt and starts responding with random values makes do without non-volatile RAM (it only needs a
as in Step 2.2 in the protocol. The resulting protocol physical random number generator).5
would be k-traceable – an adversary would be able to
track a tag over at most k sessions, with the same Tr 8. What is not covered in this paper?
value. (Note that the adversary can track actively, by
interrogating the tag, or passively, by eavesdropping on Due to space limitations, security properties of YA-
interactions between the tag and valid readers.) TRAP are not addressed. However, most of the se-
curity analysis in [1] applies to YA-TRAP. The full
version of this paper will include a detailed discussion.
7.2 Efficiency/Cost Considerations Also overview of related work is deferred to the full
version of this paper. While we use [2] as one point of
The proposed protocol is fairly efficient. When an ac- comparison, a recent protocol by Avoine and Oechslin
ceptable Tr is received, the computational burden on [3] is similar in spirit (but very different in technical
the tag is limited to a single keyed hash computation details) from YA-TRAP.
(e.g., an HMAC). Otherwise, a tag is required to gener-
ate a pseudo-random value (via P RN G), which, as dis- Acknowledgements
cussed earlier, also amounts to a single HMAC. Again,
we stress that the two cases are indistinguishable with Many thanks to David Molnar, Ari Juels, Einar Myk-
respect to their runtime. The reader is not involved letun and Joao Girao for their helpful comments.
computationally in YA-TRAP, since it neither gener-
ates nor checks any values. The computational load References
on the server is not light, by any means. However,
it does not require any on-demand (real-time) compu- [1] A. Herzberg, H. Krawczyk and G. Tsudik, On Traveling
tation other than a simple table look-up. The server Incognito, IEEE Workshop on Mobile Systems and Applica-
has the freedom to (pre-)compute ephemeral tables at tions, December 1994.
any time. The amount of pre-computation would likely [2] D. Molnar, A. Soppera and D. Wagner, A Scalable, Dele-
depend on available storage, among other factors. gatable Pseudonym Protocol Enabling Ownership Transfer of
RFID Tags, Workshop in Selected Areas in Cryptography,
The efficiency of our protocol as far as server load August 2005.
can be illustrated by comparison. One simple and se- [3] G. Avoine and P. Oechslin, A Scalable and Provably Secure
cure approach to untraceable tag identification involves Hash-Based RFID Protocol, IEEE PerSec Workshop, March
the reader sending a random challenge Rr to the tag 2005.
and the tag replying with keyed hash (or encryption)
of the reader’s challenge Ht and the tag’s own random
confounder/nonce Rt . The reader forwards the reply –
comprised of Ht , Rr and Rt – to the server. In order
to identify the tag, the server needs to perform O(n) 5 The other protocol presented in [2] requires tags to have
on-line keyed hashes (or encryptions), where n is the non-volatile storage for a a counter.