Cryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems

نویسندگان

  • Masoumeh Safkhani
  • Pedro Peris-Lopez
  • Julio César Hernández Castro
  • Nasour Bagheri
  • Majid Naderi
چکیده

Radio frequency identification systems need protocols to provide confidentiality, user privacy, mutual authentication and etc. These protocols should resist active and passive attacks such as forgery, traceability, replay and desynchronization attacks. In this paper we cryptanalysis a hash based RFID mutual authentication protocol which has been recently proposed by Cho et al. More precisely, we present the following attacks on this protocol: 1. Desynchronization attack: the success probability of attack is “1” while the attack complexity is one run of protocol. 2. Tag impersonation attack: the success probability of attack is “ 1 4 ” for two runs of protocol. 3. Reader impersonation attack: the success probability of attack is “ 14 ” for two runs of protocol.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol

Radio frequency identification systems need secure protocols to provide confidentiality, privacy protection, mutual authentication, etc. These protocols should resist active and passive attacks such as forgery, traceability, replay and de-synchronization attacks. Cho et al. recently proposed a hash-basedmutual authentication protocol (Cho et al., 2012) and claimed that their scheme addresses al...

متن کامل

An Efficient Improvement on Safkhani et al.’s Hash-Based Mutual Authentication Protocol for RFID Systems

Nowadays, plenty of radio frequency identification (RFID) systems have been proposed and used in the real world for convenience. An RFID system requires advanced properties of confidentiality, indistinguishability, forward security and mutual authentication to provide a higher security level. Safkhani et al. proposed a hash-based authentication protocol for RFID systems. Though their protocol p...

متن کامل

Vulnerabilities and Improvements on HRAP+, a Hash-Based RFID Authentication Protocol

In the last decade, Radio Frequency Identification (RFID) systems are employed in many authentications and identifications applications. In RFID systems, in order to provide secure authentication between RFID users, different authentication protocols proposed. In 2011, Cho et al. proposed a hash-based mutual RFID authentication protocol (HRAP). They claimed that HRAP protocol provides secure co...

متن کامل

RFID Mutual Authentication Protocol based on Synchronized Secret

Radio Frequency Identification (RFID) tags, due to their ability to uniquely identify every individual item and low cost, are well suited for supply chain management and are expected to replace barcodes in the near future. However, unlike barcodes, these tags have a longer range in which they are allowed to be scanned, subjecting them to unauthorized scanning by malicious readers and to various...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2011  شماره 

صفحات  -

تاریخ انتشار 2011