Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme

  • Authors:
  • Jorge Munilla;Fuchun Guo;Willy Susilo

  • Affiliations:
  • E.T.S.I. Telecomunicación, University of Málaga, Málaga, Spain;School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia;School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia

  • Venue:
  • Wireless Personal Communications: An International Journal
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recently, Chen and Chien have proposed a novel ownership transfer scheme with low implementation costs and conforming to the EPC Class-1 Generation-2 standard. The authors claimed that the proposed scheme is able to resist all attacks, and hence it has better security and performance than its predecessors. However, in this paper we show that the protocol fails short of its security objectives, and it is even less secure than the previously proposed schemes. In fact, we describe several attacks which allow to recover all the secret information stored in the tag. Obviously, once this information is known, tags can be easily traced and impersonated.