Nothing Special   »   [go: up one dir, main page]

What a lovely hat

Is it made out of tin foil?

Paper 2013/855

Weaknesses in a Recently Proposed RFID Authentication Protocol

Mete Akgün and M. Ufuk Çaǧlayan

Abstract

Many RFID authentication protocols have been proposed to provide desired security and privacy level for RFID systems. Almost all of these protocols are based symmetric cryptography because of the limited resources of RFID tags. Recently Cheng et. al have been proposed an RFID security protocol based on chaotic maps. In this paper, we analyze the security of this protocol and discover its vulnerabilities. We firstly present a de-synchronization attack in which a passive adversary makes the shared secrets out-of-synchronization by eavesdropping just one protocol session. We secondly present a secret disclosure attack in which a passive adversary extracts secrets of a tag by eavesdropping just one protocol session. An adversary having the secrets of the tag can launch some other attacks.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
RFIDAuthenticationSecurityPrivacy
Contact author(s)
meteakgun @ gmail com
History
2013-12-20: received
Short URL
https://ia.cr/2013/855
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2013/855,
      author = {Mete Akgün and M.  Ufuk Çaǧlayan},
      title = {Weaknesses in a Recently Proposed {RFID} Authentication Protocol},
      howpublished = {Cryptology {ePrint} Archive, Paper 2013/855},
      year = {2013},
      url = {https://eprint.iacr.org/2013/855}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.