2012
DOI: 10.1007/978-3-642-30955-7_4
|View full text |Cite
|
Sign up to set email alerts
|

Another Fallen Hash-Based RFID Authentication Protocol

Abstract: Abstract. In this paper, we scrutinize the security of an RFID protocol [9], which has been recently proposed, and show important vulnerabilities. Our first attack is a passive one that can disclose all secret information stored on the tags' memory. We only need to eavesdrop one session of the protocol between a tag and a legitimate reader (connected to the back-end database) and perform O(2 17 ) off-line evaluations of the PRNG-function -while the authors wrongly claimed the complexity of any such attack woul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…However authors do not show that their generic functions are compatible with lightweight RFID tags. In [25], Yeh proposes a protocol corrected by Habibi [26], but attacks [27] appear using O(2 17 ) off-line evaluations of the main function. Recently, some protocols are also defined in ISO/IEC WD 26167-6.…”
Section: Related Workmentioning
confidence: 99%
“…However authors do not show that their generic functions are compatible with lightweight RFID tags. In [25], Yeh proposes a protocol corrected by Habibi [26], but attacks [27] appear using O(2 17 ) off-line evaluations of the main function. Recently, some protocols are also defined in ISO/IEC WD 26167-6.…”
Section: Related Workmentioning
confidence: 99%