Vulnerability of an RFID authentication protocol proposed in at secubiq 2005

  • Authors:
  • Daesung Kwon;Daewan Han;Jooyoung Lee;Yongjin Yeom

  • Affiliations:
  • National Security Research Institute, Daejeon, Korea;National Security Research Institute, Daejeon, Korea;National Security Research Institute, Daejeon, Korea;National Security Research Institute, Daejeon, Korea

  • Venue:
  • EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we analyze the security of the RFID authentication protocol proposed by Choi et al. at SecUbiq 2005. They claimed that their protocol is secure against all possible threats considered in RFID systems. However, we show that the protocol is vulnerable to an impersonation attack. Moreover, an attacker is able to trace a tag by querying it twice, given the initial information from $2^{\lceil(log_2(\ell+1)\rceil)}$ + 1(≈ℓ+2) consecutive sessions and 2 · $2^{\lceil log_2(\ell+1)\rceil}$ (≈2(ℓ+1)) consecutive queries, where ℓ is the length of secret values (in binary).