Shared Flashcard Set

Details

Authentication
RFID auth
10
Computer Science
Undergraduate 4
04/28/2012

Additional Computer Science Flashcards

 


 

Cards

Term
What two passwords are associated with a tag?
Definition
Lock
Kill
Term
What is lock meant to protect against?
Definition
Unauthorised writing
Term
What length did the password used to be?
Definition
8 bits
Term
What is the length of the passwords now?
Definition
32bits
Term
Any issues with this?
Definition
No lockout or delay after unsuccessful attempts
Term
What does the kill op do?
Definition
Deletes the important info on a tag
Term
What other operation exists that isn't in the slides?
Definition
Sleep
Term
How does 'Lightweight Protocol to protect against Traceability and Cloning Attacks' seek to authenticate?
Definition
Hashing a shared key which changes everytime log in and random session IDs
Term
How does Privacy Enhanced Active Tag Scheme work?
Definition
• The scheme works by requiring the active tag to output a temporary ID called an Anonymous-ID.

• The Anonymous-ID is a different random value each time the tag transmits.

• The security server uses the Anonymous-ID to decrypt and determine the actual ID of the tag.

• The true ID is then passed back to the reader via secure channels.
Term
How does trusted computing protocol work/
Definition
Using a centralised trusted authority
Supporting users have an ad free experience!