Premium
Vulnerability analysis of elliptic curve cryptography‐based RFID authentication protocols
Author(s) -
Lv Chao,
Li Hui,
Ma Jianfeng,
Zhang Yaoyu
Publication year - 2012
Publication title -
transactions on emerging telecommunications technologies
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.366
H-Index - 47
ISSN - 2161-3915
DOI - 10.1002/ett.2514
Subject(s) - computer security , computer science , vulnerability (computing) , adversary , elliptic curve cryptography , authentication (law) , radio frequency identification , cryptography , man in the middle attack , identification (biology) , public key cryptography , encryption , botany , biology
Radio Frequency Identification (RFID), we show that three recently proposed RFID authentication protocols which rely exclusively on the used of Elliptic Curve Cryptography are not secure against the tracking attack. To make this attack successfully, the adversary needs to execute three phases. Firstly, the attacker just eavesdrops on the messages exchanged between Server and Tag. Secondly, the attacker impersonates Server to reply with the same random number that is obtained from previous phase. Finally, the adversary acts as a man in the middle to tamper the exchanged messages. Then, we propose enhancements and prove that the revisions are secure against the tracking attack that keep other security properties. Copyright © 2012 John Wiley & Sons, Ltd.