“…Many classic solutions 3,24–26 have been proposed to ensure the disappearance of security 18,26,27 and privacy 2,17,22,23,28 problems in RFID systems, and the these solutions are mainly divided into two categories: one is physical security mechanism; the other is password security mechanism that attempts to use a variety of passwords. Because the physical security mechanism is limited by factors such as the particularity and limitations of the RFID system, the password security mechanism is favored by researchers, especially the RFID security authentication mechanism 1,25,29–33 with hash function 34,35 is embedded in the system which has a more unique advantage in contrast with the physical security mechanism. In this article, we consider the security, cost, and complexity of RFID system.…”