On the Security of Two Ownership Transfer Protocols and Their Improvements

On the Security of Two Ownership Transfer Protocols and Their Improvements

Nasour Bagheri1, Farhad Aghili1, and Masoumeh Safkhani2

1Electrical Engineering Department, Shahid Rajaee Teacher Training University, Iran

2Computer Engineering Department, Shahid Rajaee Teacher Training University, Iran

Abstract: In recent years, Radio Frequency Identification (RFID) systems are widely used in many applications. In some applications, the ownership of an RFID tag might change. To provide a solution, researchers have proposed several ownership transfer protocols based on encryption functions for RFID-tagged objects. In this paper, we consider the security of Kapoor and Piramuthu [3] ownership transfer protocol and Kapoor et al. [4] ownership transfer protocol. More precisely, we present de-synchronization attacks against these protocols. The success probability of all attacks is 1 while the complexity is only two runs of protocol. Finally, we present our suggestions to improve the security of these protocols.

Keywords: RFID, cryptanalysis, ownership transfer protocol, de-synchronization attack.

Received February 4, 2014; accepted December 23, 2015

Full text 

Read 1682 times Last modified on Sunday, 20 May 2018 04:54
Share
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…