Term
| What two passwords are associated with a tag? |
|
Definition
|
|
Term
| What is lock meant to protect against? |
|
Definition
|
|
Term
| What length did the password used to be? |
|
Definition
|
|
Term
| What is the length of the passwords now? |
|
Definition
|
|
Term
|
Definition
| No lockout or delay after unsuccessful attempts |
|
|
Term
| What does the kill op do? |
|
Definition
| Deletes the important info on a tag |
|
|
Term
| What other operation exists that isn't in the slides? |
|
Definition
|
|
Term
| How does 'Lightweight Protocol to protect against Traceability and Cloning Attacks' seek to authenticate? |
|
Definition
| Hashing a shared key which changes everytime log in and random session IDs |
|
|
Term
| How does Privacy Enhanced Active Tag Scheme work? |
|
Definition
• The scheme works by requiring the active tag to output a temporary ID called an Anonymous-ID.
• The Anonymous-ID is a different random value each time the tag transmits.
• The security server uses the Anonymous-ID to decrypt and determine the actual ID of the tag.
• The true ID is then passed back to the reader via secure channels. |
|
|
Term
| How does trusted computing protocol work/ |
|
Definition
| Using a centralised trusted authority |
|
|