Noureddine Chikouche

Work place: Computer Science Department, University of M'sila, BP. 166 Ichebilia, 28000 M'sila, Algeria

E-mail: chiknour28@yahoo.fr

Website:

Research Interests: Cryptographic Coding, Formal Semantics, Formal Languages

Biography

Noureddine Chikouche, received his the engineer degree in computer science from the University of Constantine, Algeria, in 1999. In addition, he received his master’s degree in computer science from the University of M'sila, Algeria, in 2010. He has been a Ph.D. candidate at University of Biskra, Algeria. He also is assistant professor in computer sciences Department at University of M'sila, from 2011. His research interests include RFID  security, formal verification of cryptographic protocols, and code-based cryptography.

Author Articles
A Secure Code-Based Authentication Scheme for RFID Systems

By Noureddine Chikouche Foudil Cherif Pierre-Louis Cayrel Mohamed Benmohammed

DOI: https://doi.org/10.5815/ijcnis.2015.09.01, Pub. Date: 8 Aug. 2015

Two essential problems are still posed in terms of Radio Frequency Identification (RFID) systems, including: security and limitation of resources. Recently, Li et al.'s proposed a mutual authentication scheme for RFID systems in 2014, it is based on Quasi Cyclic-Moderate Density Parity Check (QC-MDPC) McEliece cryptosystem. This cryptosystem is designed to reducing the key sizes. In this paper, we found that this scheme does not provide untraceability and forward secrecy properties. Furthermore, we propose an improved version of this scheme to eliminate existing vulnerabilities of studied scheme. It is based on the QC-MDPC McEliece cryptosystem with padding the plaintext by a random bit-string. Our work also includes a security comparison between our improved scheme and different code-based RFID authentication schemes. We prove secrecy and mutual authentication properties by AVISPA (Automated Validation of Internet Security Protocols and Applications) tools. Concerning the performance, our scheme is suitable for low-cost tags with resource limitation.

[...] Read more.
Other Articles