Abstract:
In this paper, we amply discuss how temporary state disclosure affects mutual authentication and privacy of RFID protocols, and illustrate this on two well-known protocols. We argue then in favor of using the PUF technology in order to achieve mutual authentication and a reasonable enough level of privacy under temporary state disclosure. We close by presenting two RFID schemes that achieve destructive privacy, one of the most important levels of privacy in the context of the physical corruption of tags.