Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols.

Chao Lv,Hui Li,Jianfeng Ma,Yaoyu Zhang
DOI: https://doi.org/10.1002/ett.2514
IF: 3.6
2012-01-01
Transactions on Emerging Telecommunications Technologies
Abstract:Radio Frequency Identification (RFID), we show that three recently proposed RFID authentication protocols which rely exclusively on the used of Elliptic Curve Cryptography are not secure against the tracking attack. To make this attack successfully, the adversary needs to execute three phases. Firstly, the attacker just eavesdrops on the messages exchanged between Server and Tag. Secondly, the attacker impersonates Server to reply with the same random number that is obtained from previous phase. Finally, the adversary acts as a man in the middle to tamper the exchanged messages. Then, we propose enhancements and prove that the revisions are secure against the tracking attack that keep other security properties. Copyright (C) 2012 John Wiley & Sons, Ltd.
What problem does this paper attempt to address?