Academic Journals Database
Disseminating quality controlled scientific knowledge

Cryptanalysisof two mutual authentication protocols for low-cost RFID

Author(s): Mohammad Hassan Habibi | Mahmoud Gardeshi | Mahdi Alaghband

Journal: International Journal of Distributed and Parallel Systems
ISSN 2229-3957

Volume: 2;
Issue: 1;
Start page: 103;
Date: 2011;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: RFID | desynchronization | privacy analysis | mutual authentication | security

Radio Frequency Identification (RFID) is appearing as a favorite technology for automated identification, which can be widely applied to many applications such as e-passport, supply chainmanagement and ticketing. However, researchers have found many security and privacy problems along RFID technology. In recent years, many researchers are interested in RFID authentication protocols and their security flaws. In this paper, we analyze two of the newest RFID authentication protocols whichproposed by Fu et al. and Li et al. from several security viewpoints. We present different attacks such as desynchronization attack and privacy analysis over these protocols
Save time & money - Smart Internet Solutions     

Tango Rapperswil
Tango Rapperswil