[Resource Topic] 2011/194: Cryptanalysis of Chen \textit{et al.}'s RFID Access Control Protocol

Welcome to the resource topic for 2011/194

Cryptanalysis of Chen \textit{et al.}'s RFID Access Control Protocol

Authors: Masoumeh Safkhani, Nasour Bagheri, Majid Naderi


Recently Chen \textit{et al.} have proposed a RFID access control protocol based on the strategy of indefinite-index and challenge-response. They have claimed that their protocol provides optimal location privacy and resists against man in the middle, spoofed tag and spoofed reader attacks. However, in this paper we show that Chen \textit{ et al.} protocol does not provide the claimed security. More precisely, we present the following attacks on the protocol: \begin{enumerate} \item Tag impersonation attack. \item Reader impersonation attack. \item Location traceability attack. \end{enumerate} All attacks presented in this paper have the success probability of ‘1’ on the cost of only one or two runs of protocol.

ePrint: https://eprint.iacr.org/2011/194

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .