1) The old owner should not be able to access the tag after
the ownership transfer takes place.
2) The new owner should be able to perform mutual
authentication with the tag after the ownership transfer
has taken place.
Both ownership protocols work under the following assumptions: