I. Introduction
Wireless communication security has become an important topic over the past years owing to numerous thefts of different kinds. Data, being transmitted in a classical public channel, can be collected by a third party, causing a big privacy issue. Numerous security protocols have been developed to address those issues and allowed using cellular communications and other wireless applications rather safely [1]. However, several fundamental loopholes remain and seem to be unsolvable with software encryption approaches. A celebrated example is radio frequency identification (RFID), where data are encoded on a chip connected to an antenna [2]. This passive device is interrogated by an active reader. In this communication protocol, data are encoded on time-modulated back reflection from a tag. Being standardized, this wireless channel is subject to theft since any card obeying the standard should be accessible by any reader. A typical example here is data theft from contactless credit cards [3], [4]. One of the theft schemes is based on approaching a victim with a billing terminal and charging a small amount, which does not require a PIN-code authorization. While nowadays this theft scheme is applied in crowded places, where physical proximity with a victim is less alarming, RFID theft from a range is also possible [5], [6]. It is worth noting that credit cards operate at 13.6 MHz, though our investigations will concentrate on ultrahigh frequency (UHF) RFID, operating around 900 MHz, depending on a licensing country [7].