“…The attacker can analyze the reply information of the tag by constantly asking the tags, and then all the key information stored in the tag can be deduced completely; The proposed authentication scheme proposed in the literature [10] cannot provide backward privacy security; The proposed scheme in the literature [11] can not resist brute force attacks, because R1 and R2 use cleartext, so an attacker can easily access the R1 and R2, using the exhaustive method can derive the stored key information from the tag; The literature [12] proposed cross bit operation according to the knowledge of genetic algorithms Cro (X, Y) , with the combination of XOR and Rot algorithm CURAP is proposed, but CURAP is too complex in the operation, and do not make use of their own label information stored, at the same time, after each certification ended, the need to update the content too much, which will to increase the amount of calculation and the increase of storage space, and the analysis shows that the protocol security is insufficient. According to the existing research results, this paper combines CRC and Cro algorithm proposed an improved lightweight RFID mutual authentication protocol.…”