DocumentCode :
2675563
Title :
Cryptanalysis of the LCSS RFID Authentication Protocol
Author :
Cao, Tianjie ; Shen, Peng ; Bertino, Elisa
Author_Institution :
Sch. of Comput., China Univ. of Min. & Technol., Xuzhou
fYear :
2008
fDate :
3-5 Aug. 2008
Firstpage :
305
Lastpage :
309
Abstract :
To reduce the computational load on both the back-end database and the tags, Ha et al. proposed a low-cost and strong-security (LCSS) RFID authentication protocol. In this paper, we identify two effective attacks, a desynchronization attack and a spoofing attack, against the LCSS protocol. The former attack can break the synchronization between the RFID reader and the tag in a single protocol run so that they can not authenticate each other in any following protocol run. The latter can impersonate a legal tag to spoof the RFID reader by extracting the ID of a specific tag during the authentication process. Moreover, we point out the potential countermeasure by adding an integrity check to improve the security.
Keywords :
cryptographic protocols; message authentication; radiofrequency identification; synchronisation; back-end database; cryptanalysis; desynchronization attack; low-cost RFID authentication protocol; spoofing attack; strong-security RFID authentication protocol; Authentication; Computer security; Costs; Cryptographic protocols; Data security; Databases; Electronic commerce; RFID tags; Radio frequency; Radiofrequency identification; Authentication; Cryptanalysis; RFID;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electronic Commerce and Security, 2008 International Symposium on
Conference_Location :
Guangzhou City
Print_ISBN :
978-0-7695-3258-5
Type :
conf
DOI :
10.1109/ISECS.2008.73
Filename :
4606077
Link To Document :
بازگشت