Mathematical cryptology for computer scientists and mathematicians
Mathematical cryptology for computer scientists and mathematicians
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
RFID security without extensive cryptography
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Cryptography and authentication on RFID passive tags for apparel products
Computers in Industry
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Computer Standards & Interfaces
M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Challenge-eesponse based RFID authentication protocol for distributed database environment
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Reducing time complexity in RFID systems
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
MD5 collisions and the impact on computer forensics
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Mutual authentication scheme for EPC tags- readers in the supply chain
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Improvement of the RFID authentication scheme based on quadratic residues
Computer Communications
An authentication protocol for low-cost RFID tags
International Journal of Mobile Communications
A minimum disclosure approach to authentication and privacy in RFID systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
A synchronization strengthen RFID authentication protocol based on key array
AICI'12 Proceedings of the 4th international conference on Artificial Intelligence and Computational Intelligence
Improvement of the Hash-Based RFID Mutual Authentication Protocol
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
In 2004, Ari Juels proposed a Yoking-Proofs protocol for RFID systems. Their aim is to permit a pair of tags to generate a proof which is verifiable off-line by a trusted entity even when the readers are potentially untrusted. However, we found that their protocol does not possess the anonymity property but also suffers from both known-plaintext attack and replay attack. Wong et al. [Kirk H.M. Wong, Patrick C.L. Hui, Allan C.K. Chan, Cryptography and authentication on RFID passive tags for apparel products, Computer in Industry 57 (2005) 342-349] proposed an authentication scheme for RFID passive tags, attempting to be a standard for apparel products. Yet, to our review, their protocol suffers from guessing parameter attack and replay attack. Moreover, both of the schemes have the common weakness: the backend server must use brute search for each tag's authentication. In this paper, we first describe the weaknesses in the two above-mentioned protocols. Then, we propose a novel efficient scheme which not only achieve the mutual authentication between the server and the tag but also can satisfy all the security requirements needed in an RFID system.