Weaknesses in Two RFID Authentication Protocols

  • Noureddine Chikouche
  • Foudil Cherif
  • Pierre-Louis Cayrel
  • Mohamed Benmohammed
Conference paper

DOI: 10.1007/978-3-319-18681-8_13

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9084)
Cite this paper as:
Chikouche N., Cherif F., Cayrel PL., Benmohammed M. (2015) Weaknesses in Two RFID Authentication Protocols. In: El Hajji S., Nitaj A., Carlet C., Souidi E. (eds) Codes, Cryptology, and Information Security. C2SI 2015. Lecture Notes in Computer Science, vol 9084. Springer, Cham

Abstract

One of the most important challenges related to Radio Frequency Identification (RFID) systems is security. In this paper, we analyze the security and performance of two recent RFID authentication protocols based on two different code-based cryptography schemes. The first one, proposed by Malek and Miri, is based on randomized McEliece cryptosystem. The second one, proposed by Li et al., is based on Quasi Cyclic-Moderate Density Parity Check (QC-MDPC) McEliece cryptosystem. We provide enough evidence to prove that these two RFID authentication protocols are not secure. Furthermore, we propose an improved protocol that eliminates existing weaknesses in studied protocols.

Keywords

McEliece cryptosystem RFID Authentication protocol Desynchronization attack Traceability attack 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Noureddine Chikouche
    • 1
  • Foudil Cherif
    • 2
  • Pierre-Louis Cayrel
    • 3
  • Mohamed Benmohammed
    • 4
  1. 1.Computer Science DepartmentUniversity of M’silaM’silaAlgeria
  2. 2.Computer Science Department, LESIA LaboratoryUniversity of BiskraBiskraAlgeria
  3. 3.Laboratoire Hubert Curien, UMR CNRS 5516Saint-ÉtienneFrance
  4. 4.LIRE LaboratoryUniversity of Constantine 2ConstantineAlgeria

Personalised recommendations