Abstract
RFID is now in fashion. Exactly 20 years ago it was pointed out that identification based on electronic tokens suffer from the middleman attack. So, obviously RFIDs do too. Worse, the middleman attack is even easier to set up. Privacy advocates have expressed concerns about the use of RFIDs. Two implementations are compared: the use of RFID cards in the underground in Shanghai (similarly for Singapore) and the use in the London system. We conclude that privacy concerns can sometimes be addressed succesfully. We also address reliabilty concerns since RFID cards are easy to break. Finally we address the psychological issue that RFIDs are believed to be secure.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-540-77366-5_37
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
AlFaraj, A.: Personal communication (2006)
AlFaraj, A.: Rfid insecurity for entity authentication. Master’s thesis University College London, Computer Science (2006)
Bengio, S., Brassard, G., Desmedt, Y.G., Goutier, C., Quisquater, J.-J.: Secure implementations of identification systems. Journal of Cryptology 4, 175–183 (1991)
Beth, T., Desmedt, Y.: Identification tokens — or: Solving the chess grandmaster problem. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 169–176. Springer, Heidelberg (1991)
Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994)
Desmedt, Y.: Establishing Big Brother using covert channels and other covert techniques. In: Anderson, R. (ed.) Information Hiding. LNCS, vol. 1174, pp. 65–71. Springer, Heidelberg (1996)
Desmedt, Y., Goutier, C., Bengio, S.: Special uses and abuses of the Fiat-Shamir passport protocol. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 21–39. Springer, Heidelberg (1988)
Smrt, tickets, http://www.smrt.com.sg/trains/tickets.html
Transport for London, Get Oyster Card, https://sales.oystercard.com/oyster/lul/guestFirstIssue.do
Pope Benedict XVI: Address of his Holiness Benedict XVI to the Members of the Pontifical Academy of Sciences (November 6, 2006), http://www.vatican.va/holy_father/benedict_xvi/speeches/2006/november/documents/hf_ben-xvi_spe_20061106_academy-sciences_en.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Desmedt, Y. (2007). Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure. In: Dietrich, S., Dhamija, R. (eds) Financial Cryptography and Data Security. FC 2007. Lecture Notes in Computer Science, vol 4886. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77366-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-77366-5_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77365-8
Online ISBN: 978-3-540-77366-5
eBook Packages: Computer ScienceComputer Science (R0)