Attacks on CKK Family of RFID Authentication Protocols
- Cite this paper as:
- Gołębiewski Z., Majcher K., Zagórski F. (2008) Attacks on CKK Family of RFID Authentication Protocols. In: Coudert D., Simplot-Ryl D., Stojmenovic I. (eds) Ad-hoc, Mobile and Wireless Networks. ADHOC-NOW 2008. Lecture Notes in Computer Science, vol 5198. Springer, Berlin, Heidelberg
At Pervasive 2008, Cichon, Klonowski, Kutylowski proposed a family of shared-key authentication protocols (\(\mathcal CKK\)). Small computational and communication cost, together with possibility of efficient hardware implementation makes \(\mathcal CKK\) attractive for low-cost devices such as RFID tags. In this paper we present a couple of attacks on \(\mathcal CKK\) protocols, both passive and active.
Keywordslightweight cryptography RFID authentication HB HB+
Unable to display preview. Download preview PDF.