Attacks on CKK Family of RFID Authentication Protocols

  • Zbigniew Gołębiewski
  • Krzysztof Majcher
  • Filip Zagórski
Conference paper

DOI: 10.1007/978-3-540-85209-4_19

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5198)
Cite this paper as:
Gołębiewski Z., Majcher K., Zagórski F. (2008) Attacks on CKK Family of RFID Authentication Protocols. In: Coudert D., Simplot-Ryl D., Stojmenovic I. (eds) Ad-hoc, Mobile and Wireless Networks. ADHOC-NOW 2008. Lecture Notes in Computer Science, vol 5198. Springer, Berlin, Heidelberg

Abstract

At Pervasive 2008, Cichon, Klonowski, Kutylowski proposed a family of shared-key authentication protocols (\(\mathcal CKK\)). Small computational and communication cost, together with possibility of efficient hardware implementation makes \(\mathcal CKK\)  attractive for low-cost devices such as RFID tags. In this paper we present a couple of attacks on \(\mathcal CKK\)  protocols, both passive and active.

Keywords

lightweight cryptography RFID authentication HB HB+ 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Zbigniew Gołębiewski
    • 1
  • Krzysztof Majcher
    • 2
  • Filip Zagórski
    • 2
  1. 1.Institute of Computer ScienceWrocław University 
  2. 2.Institute of Mathematics and Computer ScienceWrocław University of Technology 

Personalised recommendations