2006
DOI: 10.1007/11943952_38
|View full text |Cite
|
Sign up to set email alerts
|

Mutual-Authentication Mechanism for RFID Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(34 citation statements)
references
References 9 publications
0
34
0
Order By: Relevance
“…A modified communication method between the reader and tag is also proposed in order to satisfy the strict timing requirement. However, this research reveals a possibility for the adversary to achieve the shared key of the AES encryption block [7]. In addition, the identical challenge always results in the identical cipher response which causes it to be susceptible to replay attack and tag clone.…”
Section: ) Cipher-based Proposalsmentioning
confidence: 95%
See 1 more Smart Citation
“…A modified communication method between the reader and tag is also proposed in order to satisfy the strict timing requirement. However, this research reveals a possibility for the adversary to achieve the shared key of the AES encryption block [7]. In addition, the identical challenge always results in the identical cipher response which causes it to be susceptible to replay attack and tag clone.…”
Section: ) Cipher-based Proposalsmentioning
confidence: 95%
“…Some of them were developed based on cipher algorithms such as Advanced Encryption Standard (AES) or Elliptic Curve Cryptography (ECC) [4], [5], [6], [7]. Some utilised the hash-based algorithm, pseudo random number generator, Cyclic Redundancy Check (CRC) function and/or some ExOR and rotation operations [8], [9], [10], [11], [12].…”
mentioning
confidence: 99%
“…A protocol using only AES-encrypted parameters was proposed in [10]. The protocol shown in Figure 5a uses 2 preshared secrets k 1 and k 2 , a constant cryptographic secret key k, and a unique ID k .…”
Section: Case 2: a Protocol Using No Nonces But Only Encryptionmentioning
confidence: 99%
“…Some other protocols using secret key cryptographic algorithms are also proposed in [11], [12]. These protocols are divided into fixed access control and randomized access control.…”
Section: Related Work On Rfid Authentication Protocolsmentioning
confidence: 99%