On the claimed privacy of EC-RAC III

  • Authors:
  • Junfeng Fan;Jens Hermans;Frederik Vercauteren

  • Affiliations:
  • Department of Electrical Engineering, COSIC, K.U. Leuven and IBBT, Leuven-Heverlee, Belgium;Department of Electrical Engineering, COSIC, K.U. Leuven and IBBT, Leuven-Heverlee, Belgium;Department of Electrical Engineering, COSIC, K.U. Leuven and IBBT, Leuven-Heverlee, Belgium

  • Venue:
  • RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we show how to break the most recent version of EC-RAC with respect to privacy. We show that both the ID-Transfer and ID&PWD-Transfer schemes from EC-RAC do not provide the claimed privacy levels by using a man-in-the-middle attack. The existence of these attacks voids the presented privacy proofs for EC-RAC.