DocumentCode
589793
Title
On the security of an ECC based RFID authentication protocol
Author
Babaheidarian, P. ; Delavar, Mahshid ; Mohajeri, Javad
Author_Institution
Dept. of Electr. Eng., Sharif Univ. of Technol., Tehran, Iran
fYear
2012
fDate
13-14 Sept. 2012
Firstpage
111
Lastpage
114
Abstract
Following the fact that there are some efficient implementations of ECC-based RFID authentication protocols on RFID tags, a new family of RFID authentication protocols known as EC-RAC family has been introduced. However, it has been shown that all the versions of EC-RAC protocols are exposed to privacy and/or security threats. In this paper we analyzed a version of the EC-RAC RFID authentication protocol as well as a version of Schnorr protocol which were presented in a recent work and are claimed to have the demanding requirements. We demonstrated an impersonation attack on the claimed improved EC-RAC, and consequently showed that it would not satisfy the tag authentication property. Also, we showed that the improved Schnorr protocol does not provide the untraceability feature. Moreover, we discussed the inherent problems of the claimed protocols and why they fail.
Keywords
cryptographic protocols; data privacy; radiofrequency identification; EC-RAC RFID authentication protocol; EC-RAC family; ECC based RFID authentication protocol; RFID tags; Schnorr protocol; impersonation attack; privacy threats; security threats; tag authentication property; Authentication; Privacy; Protocols; Public key; Radiofrequency identification; Elliptic curve randomized access control; RFID; authentication protocol; traceability;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Security and Cryptology (ISCISC), 2012 9th International ISC Conference on
Conference_Location
Tabriz
Print_ISBN
978-1-4673-2387-1
Type
conf
DOI
10.1109/ISCISC.2012.6408200
Filename
6408200
Link To Document