Attacks on CKK Family of RFID Authentication Protocols

  • Zbigniew Gołębiewski
  • Krzysztof Majcher
  • Filip Zagórski
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5198)


At Pervasive 2008, Cichon, Klonowski, Kutylowski proposed a family of shared-key authentication protocols (\(\mathcal CKK\)). Small computational and communication cost, together with possibility of efficient hardware implementation makes \(\mathcal CKK\)  attractive for low-cost devices such as RFID tags. In this paper we present a couple of attacks on \(\mathcal CKK\)  protocols, both passive and active.


lightweight cryptography RFID authentication HB HB+ 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Blum, A., Kalai, A., Wasserman, H.: Noise-tolerant learning, the parity problem, and the statistical query model. Journal of the ACM 50(4), 506–519 (2003)CrossRefMathSciNetGoogle Scholar
  2. 2.
    Cichon, J., Klonowski, M., Kutylowski, M.: Privacy protection for rfid’s –hidden subset identifiers. In: Indulska, J., Patterson, D.J., Rodden, T., Ott, M. (eds.) PERVASIVE 2008. LNCS, vol. 5013, pp. 298–314. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  3. 3.
    Daemen, J., Rijmen, V.: The block cipher bksq. In: Schneier, B., Quisquater, J.-J. (eds.) CARDIS 1998. LNCS, vol. 1820, pp. 236–245. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  4. 4.
    Defend, B., Fu, K., Juels, A.: Cryptanalysis of two lightweight rfid authentication schemes. In: PERCOMW 2007: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 211–216. IEEE Computer Society Press, Washington (2007)CrossRefGoogle Scholar
  5. 5.
    El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, New York (1985)CrossRefGoogle Scholar
  6. 6.
    Gilbert, H., Sibert, H., Robshaw, M.: An active attack against a provably secure lightweight authentication protocol. IEEE Electronic Letters 41, 1169–1170 (2005)CrossRefGoogle Scholar
  7. 7.
    Hopper, N.J., Blum, M.: Secure human identification protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  8. 8.
    Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621. Springer, Heidelberg (2005)Google Scholar
  9. 9.
    Levieil, É., Fouque, P.-A.: An improved lpn algorithm. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 348–359. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  10. 10.
    Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MATHCrossRefMathSciNetGoogle Scholar
  11. 11.
    Vajda, I., Buttyan, L.: Lightweight authentication protocols for low-cost rfid tags (2003)Google Scholar
  12. 12.
    Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Zbigniew Gołębiewski
    • 1
  • Krzysztof Majcher
    • 2
  • Filip Zagórski
    • 2
  1. 1.Institute of Computer ScienceWrocław University 
  2. 2.Institute of Mathematics and Computer ScienceWrocław University of Technology 

Personalised recommendations