Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol

@article{PerisLopez2011CryptanalysisOA,
  title={Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol},
  author={Pedro Peris-Lopez and Julio C{\'e}sar Hern{\'a}ndez Castro and Juan E. Tapiador and Jan C. A. van der Lubbe},
  journal={Eng. Appl. of AI},
  year={2011},
  volume={24},
  pages={1061-1069}
}
Recently, Chen and Deng (2009) proposed an interesting new mutual authentication protocol. Their scheme is based on a cyclic redundancy code (CRC) and a pseudo-random number generator in accordance with the EPC Class-1 Generation-2 specification. The authors claimed that the proposed protocol is secure against all classical attacks against RFID systems, and that it has better security and performance than its predecessors. However, in this paper we show that the protocol fails short of its… CONTINUE READING
BETA

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 24 CITATIONS

Efficient Ultralightweight RFID Mutual Authentication

  • 2014 IEEE International Conference on Internet of Things(iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom)
  • 2014
VIEW 7 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Strengthening the Security of EPC C-1 G-2 RFID Standard

  • Wireless Personal Communications
  • 2013
VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol

  • IACR Cryptology ePrint Archive
  • 2011
VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Role of RFID Technology in Smart City Applications

  • 2019 International Conference on Communications, Signal Processing, and their Applications (ICCSPA)
  • 2019
VIEW 1 EXCERPT
CITES METHODS

A novel mutual authentication scheme for low-cost RFID systems

  • 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM)
  • 2016
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 28 REFERENCES

Secure EPC Gen 2 compliant radio frequency . Cryptology ePrint Archive , Report 2009 / 149 , 2009

C.-L. Chen, Y.-Y. Deng
  • 2009
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Cryptanalysis of a New Ultralightweight RFID Authentication Protocol—SASI

  • IEEE Transactions on Dependable and Secure Computing
  • 2009
VIEW 2 EXCERPTS

On the Authentication of RFID Systems with Bitwise Operations

  • 2008 New Technologies, Mobility and Security
  • 2008
VIEW 2 EXCERPTS