On the Security of Two RFID Mutual Authentication Protocols

  • Seyed Farhad Aghili
  • Nasour Bagheri
  • Praveen Gauravaram
  • Masoumeh Safkhani
  • Somitra Kumar Sanadhya
Conference paper

DOI: 10.1007/978-3-642-41332-2_6

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8262)
Cite this paper as:
Aghili S.F., Bagheri N., Gauravaram P., Safkhani M., Sanadhya S.K. (2013) On the Security of Two RFID Mutual Authentication Protocols. In: Hutter M., Schmidt JM. (eds) Radio Frequency Identification. RFIDSec 2013. Lecture Notes in Computer Science, vol 8262. Springer, Berlin, Heidelberg

Abstract

In this paper, the security of two recent RFID mutual authentication protocols are investigated. The first protocol is a scheme proposed by Huang et al. [7] and the second one by Huang, Lin and Li [6]. We show that these two protocols have several weaknesses. In Huang et al.’s scheme, an adversary can determine the 32-bit secret password with a probability of \(2^{-2}\), and in Huang-Lin-Li scheme, a passive adversary can recognize a target tag with a success probability of \(1-2^{-4}\) and an active adversary can determine all 32 bits of Access password with success probability of \(2^{-4}\). The computational complexity of these attacks is negligible.

Keywords

RFID EPC Class-1 Generation-2 PadGen function 

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Seyed Farhad Aghili
    • 1
  • Nasour Bagheri
    • 1
  • Praveen Gauravaram
    • 2
  • Masoumeh Safkhani
    • 3
  • Somitra Kumar Sanadhya
    • 4
  1. 1.Electrical Engineering DepartmentShahid Rajaee Teacher Training UniversityTehranIran
  2. 2.Innovation Labs HyderabadTata Consultancy Services LimitedHyderabadIndia
  3. 3.Electrical Engineering DepartmentIran University of Science and TechnologyTehranIran
  4. 4.Indraprastha Institute of Information TechnologyDelhiIndia

Personalised recommendations