Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards

@article{Han2009VulnerabilityOA,
  title={Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards},
  author={Daewan Han and Daesung Kwon},
  journal={Computer Standards & Interfaces},
  year={2009},
  volume={31},
  pages={648-652}
}
Recently, Chien et al. proposed an RFID authentication protocol, which consists of only the cyclic redundancy code (CRC) and the pseudo-random number generator (PRNG) [H. Chien, C. Chen, Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards, Computer Standards & Interfaces, vol. 29, Elsevier, 2007, pp. 254-259]. They claimed that the protocol conforms to current EPC tags, and would be secure against all attacks on RFID systems. However, in this paper, we show… CONTINUE READING

Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 42 CITATIONS

Cryptanalysis and improvement on a new RFID mutual authentication protocol compatible with EPC standard

  • 2011 8th International ISC Conference on Information Security and Cryptology
  • 2011
VIEW 5 EXCERPTS
HIGHLY INFLUENCED

Flaws on RFID grouping-proofs. Guidelines for future sound protocols

VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem

  • IACR Cryptology ePrint Archive
  • 2011
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Similar Papers

Loading similar papers…