[Resource Topic] 2013/855: Weaknesses in a Recently Proposed RFID Authentication Protocol

Welcome to the resource topic for 2013/855

Title:
Weaknesses in a Recently Proposed RFID Authentication Protocol

Authors: Mete Akgün, M. Ufuk Çaǧlayan

Abstract:

Many RFID authentication protocols have been proposed to provide desired security and privacy level for RFID systems. Almost all of these protocols are based symmetric cryptography because of the limited resources of RFID tags. Recently Cheng et. al have been proposed an RFID security protocol based on chaotic maps. In this paper, we analyze the security of this protocol and discover its vulnerabilities. We firstly present a de-synchronization attack in which a passive adversary makes the shared secrets out-of-synchronization by eavesdropping just one protocol session. We secondly present a secret disclosure attack in which a passive adversary extracts secrets of a tag by eavesdropping just one protocol session. An adversary having the secrets of the tag can launch some other attacks.

ePrint: https://eprint.iacr.org/2013/855

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .