Term
What two passwords are associated with a tag? |
|
Definition
|
|
Term
What is lock meant to protect against? |
|
Definition
|
|
Term
What length did the password used to be? |
|
Definition
|
|
Term
What is the length of the passwords now? |
|
Definition
|
|
Term
|
Definition
No lockout or delay after unsuccessful attempts |
|
|
Term
What does the kill op do? |
|
Definition
Deletes the important info on a tag |
|
|
Term
What other operation exists that isn't in the slides? |
|
Definition
|
|
Term
How does 'Lightweight Protocol to protect against Traceability and Cloning Attacks' seek to authenticate? |
|
Definition
Hashing a shared key which changes everytime log in and random session IDs |
|
|
Term
How does Privacy Enhanced Active Tag Scheme work? |
|
Definition
• The scheme works by requiring the active tag to output a temporary ID called an Anonymous-ID.
• The Anonymous-ID is a different random value each time the tag transmits.
• The security server uses the Anonymous-ID to decrypt and determine the actual ID of the tag.
• The true ID is then passed back to the reader via secure channels. |
|
|
Term
How does trusted computing protocol work/ |
|
Definition
Using a centralised trusted authority |
|
|