Cryptanalysis of some protocols for RFID systems

M Safkhani, M Naderi, N Bagheri… - Cryptology ePrint …, 2011 - eprint.iacr.org
In this paper we analyze the security of the mutual authentication and ownership transfer
protocols which have been recently proposed by Kulseng\textit {et al.} Our analysis …

On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol

M Safkhani, N Bagheri, SK Sanadhya, M Naderi… - … Workshop, DPM 2011 …, 2012 - Springer
Authentication is one of the most basic and important cryptographic tasks. Mutual
authentication protocols play a crucial role on the security of RFID systems. In this paper, we …

Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID systems

S Kardaş, M Akgün, MS Kiraz… - 2011 Workshop on …, 2011 - ieeexplore.ieee.org
Radio Frequency Identification (RFID) is a technology increasingly used in many
applications for object identification. Ownership transfer of RFID tags is also another …

Attacks and improvements to an RIFD mutual authentication protocol and its extensions

S Cai, Y Li, T Li, RH Deng - Proceedings of the second ACM conference …, 2009 - dl.acm.org
In WiSec'08, Song and Mitchell proposed an RFID mutual authentication protocol. Song also
extended this protocol for RFID tag ownership transfer. These two protocols are designed to …

An efficient and private RFID authentication protocol supporting ownership transfer

S Kardaş, S Celik, A Arslan, A Levi - … LightSec 2013, Gebze, Turkey, May 6 …, 2013 - Springer
Abstract R adio F requency ID entification (RFID) systems are getting pervasively deployed
in many daily life applications. But this increased usage of RFID systems brings some …

Vulnerability of an RFID authentication protocol proposed in at SecUbiq 2005

D Kwon, D Han, J Lee, Y Yeom - International Conference on Embedded …, 2006 - Springer
In this paper, we analyze the security of the RFID authentication protocol proposed by Choi
et al. at SecUbiq 2005. They claimed that their protocol is secure against all possible threats …

A hybrid mutual authentication protocol for RFID

H Fernando, J Abawajy - … Networking, and Services: 7th International ICST …, 2012 - Springer
Out of the large number of RFID security protocols proposed in recent years none have
proven to be truly secure and the creation of a truly secure security protocol for systems …

[PDF][PDF] Cryptanalysis of Two RFID Authentication Protocols.

T Cao, P Shen - Int. J. Netw. Secur., 2009 - Citeseer
Radio frequency identification (RFID) technologies have many advantages in applications
such as object tracking and monitoring, ticketing, supply-chain management, contactless …

Weaknesses in a recent ultra-lightweight RFID authentication protocol

P D'Arco, A De Santis - … 2008: First International Conference on Cryptology …, 2008 - Springer
In this paper we show weaknesses in SASI, a new Ultra-Lightweight RFID Authentication
Protocol, designed for providing S trong A uthentication and S trong I ntegrity. We identify …

On the security of Lo et al.'s ownership transfer protocol

M Safkhani, N Bagheri, M Naderi… - Cryptology ePrint Archive, 2012 - eprint.iacr.org
Recently Lo et al. have proposed an ownership transfer pro-tocol for RFID objects using
lightweight computing operators and claim their protocol provides stronger security …