2012
DOI: 10.1007/978-3-642-27576-0_17
|View full text |Cite
|
Sign up to set email alerts
|

Peeling Away Layers of an RFID Security System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2012
2012
2014
2014

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…While NXP (Mifare Classic) and Legic (Prime) have improved the security of their new products after a public analysis of their products [8,9], we could not find much information about SimonsVoss, one of the leading companies for for electronic locking systems in Europe. Their products include electronic locks, the corresponding access tokens, as well as equipment that is used to run and integrate the system into the existing infrastructure of a company.…”
Section: Introductionmentioning
confidence: 85%
See 1 more Smart Citation
“…While NXP (Mifare Classic) and Legic (Prime) have improved the security of their new products after a public analysis of their products [8,9], we could not find much information about SimonsVoss, one of the leading companies for for electronic locking systems in Europe. Their products include electronic locks, the corresponding access tokens, as well as equipment that is used to run and integrate the system into the existing infrastructure of a company.…”
Section: Introductionmentioning
confidence: 85%
“…This violates Kerckhoff's principle [7] and makes it difficult for third parties to independently evaluate the security of electronic locking systems. In the past, several widely deployed electronic security systems with a lack of public documentation were found out to be vulnerable against mathematical or side-channel attacks [2,8,9].…”
Section: Introductionmentioning
confidence: 99%
“…Over the last few years, much attention has been paid to the (in)security of the cryptographic mechanisms used in contactless smart cards [GdKGM + 08], [GvRVWS10], [PN12], [VGB12]. Experience has shown that the secrecy of proprietary ciphers does not contribute to their cryptographic strength.…”
Section: Research Context and Related Workmentioning
confidence: 99%
“…Over the last few years, much attention has been paid to the (in)security of the cryptographic mechanisms used in contactless smart cards [8], [13], [17], [22]. Experience has shown that the secrecy of proprietary ciphers does not contribute to its cryptographic strength.…”
Section: Introductionmentioning
confidence: 99%