2) The new owner should be able to perform mutual
authentication with the tag after the ownership transfer
has taken place.
Both ownership protocols work under the following assumptions:
In the next section, we describe the first OTP protocol and
then analyze its security against to a malicious adversary.