Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol

被引:23
|
作者
Safkhani, Masoumeh [1 ]
Pens-Lopez, Pedro [2 ]
Hernandez-Castro, Julio Cesar [3 ]
Bagheri, Nasour [4 ]
机构
[1] Iran Univ Sci & Technol, Dept Elect Engn, Tehran, Iran
[2] Univ Carlos III Madrid, Dept Comp Sci, E-28903 Getafe, Spain
[3] Univ Kent, Sch Comp, Canterbury CT2 7NF, Kent, England
[4] Shahid Rajaee Teacher Training Univ, Dept Elect Engn, Tehran, Iran
关键词
RFID; Privacy; Authentication; De-synchronization attack; Tag impersonation attack; Reader impersonation attack; SECURITY; ATTACK;
D O I
10.1016/j.cam.2013.09.073
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Radio frequency identification systems need secure protocols to provide confidentiality, privacy protection, mutual authentication, etc. These protocols should resist active and passive attacks such as forgery, traceability, replay and de-synchronization attacks. Cho et al. recently proposed a hash-based mutual authentication protocol (Cho et al., 2012) and claimed that their scheme addresses all privacy (Juels, 2006) and forgery concerns (Dimitriou, 2005; Yang et al., 2005) linked to RFID technology. However, we show in the following that the protocol fails to bear out many of the authors' security claims, which renders the protocol useless. More precisely, we present the following attacks on this protocol: 1. De-synchronization attack: the success probability of the attack is 1 while the attack complexity is one run of the protocol. 2. Tag impersonation attack: the success probability of the attack is 1/4 for two runs of the protocol. 3. Reader impersonation attack: the success probability of the attack 1/8 is for two runs of the protocol. We also show an additional and more general attack, which is still possible when the conditions needed for the ones above do not hold, and that highlights the poor design of the group ID (RID). Additionally we show how all the above mentioned attacks are applicable against another protocol, highly reminiscent of that of Cho et al. (2012) and designed in Cho et al. (2011), and also against an enhanced version of the Cho et al. protocol proposed by Kim (2012). Finally we end up by showing how slight modifications in the original protocol can prevent the aforementioned security faults. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:571 / 577
页数:7
相关论文
共 50 条
  • [31] RFID mutual-authentication protocol with synchronous updatedkeys based on Hash function
    Zhang Xiaohong
    Hu Yingmeng
    [J]. The Journal of China Universities of Posts and Telecommunications, 2015, 22 (06) : 27 - 35
  • [32] Mean-set attack: cryptanalysis of Sibert et al. authentication protocol
    Mosina, Natalia
    Ushakov, Alexander
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2010, 4 (02) : 149 - 174
  • [33] Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.
    Irshad, Azeem
    Sher, Muhammad
    Alzahrani, Bander A.
    Albeshri, Aiiad
    Chaudhry, Shehzad Ashraf
    Kumari, Saru
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (01): : 523 - 549
  • [34] Cryptanalysis of Kumar et al.'s Authentication Protocol for Wireless Sensor Networks
    Ha, Sewan
    Ryu, Jihyeon
    Kim, Hyoungshick
    Won, Dongho
    Lee, Youngsook
    [J]. INFORMATION SCIENCE AND APPLICATIONS, 2020, 621 : 329 - 340
  • [35] RFID tag-based mutual authentication protocol with improved security for TMIS
    Chander, Bhanu
    Gopalakrishnan, Kumaravelan
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 18 (3-4) : 383 - 405
  • [36] Cryptanalysis on improved Chou et al.'s ID-based deniable authentication protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    [J]. ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 87 - +
  • [37] Hash-Based Tag Ownership Transfer Protocol Against Traceability
    Jin, Yongming
    Sun, Huiping
    Chen, Zhong
    [J]. ICEBE 2009: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2009, : 487 - +
  • [38] An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection
    Shen, Jian
    Tan, Haowen
    Zheng, Yuhui
    Ji, Sai
    Wang, Jin
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 2070 - 2079
  • [39] Cryptanalysis of the LCSS RFID Authentication Protocol
    Cao, Tianjie
    Shen, Peng
    Bertino, Elisa
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 305 - +
  • [40] An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol
    Ren, Xuping
    Xu, Xianghua
    Li, Yunfa
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2405 - 2412