In this paper, we analyze the security of the RFID authentication protocol proposed by Choi et al. at SecUbiq 2005. They claimed that their protocol is secure against all possible threats considered in RFID systems. However, we show that the protocol is vulnerable to an impersonation attack. Moreover, an attacker is able to trace a tag by querying it twice, given the initial information from 2⌈log2(ℓ+1)⌉+ 1(≈ ℓ + 2) consecutive sessions and 2 - 2⌈log2(ℓ+1)⌉ (& 2(ℓ + 1)) consecutive queries, where ℓ is the length of secret values (in binary). © IFIP International Federation for Information Processing 2006.
CITATION STYLE
Kwon, D., Han, D., Lee, J., & Yeom, Y. (2006). Vulnerability of an RFID authentication protocol proposed in at SecUbiq 2005. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4097 LNCS, pp. 262–270). Springer Verlag. https://doi.org/10.1007/11807964_27
Mendeley helps you to discover research relevant for your work.