Cryptanalysis and improvement of a RFID authentication scheme

Tianjie Cao,Yong Zhang
2009-01-01
Journal of Computational Information Systems
Abstract:Three effective attacks, namely impersonation attack, de-synchronization attack and backward tracing attack, against Song and Mitchell's RFID authentication scheme are identified in this paper. The impersonation attack can spoof the reader though a replay attack. The de-synchronization attack can break the synchronization between the RFID reader and the tag so that they can not authenticate each other in any following protocol runs. The backward tracing attack can identify the past interactions of a tag if the attacker knows the tag's present internal stat e. An improved RFID scheme resistant to these attacks is also proposed. © 2009 Binary Information Press August, 2009.
What problem does this paper attempt to address?