On the Security of Two Ownership Transfer
Protocols and Their Improvements
Nasour Bagheri1,
Farhad Aghili1, and Masoumeh Safkhani2
1Electrical
Engineering Department, Shahid Rajaee Teacher Training University, Iran
2Computer
Engineering Department, Shahid Rajaee Teacher Training University, Iran
Abstract:
In recent years, Radio Frequency Identification (RFID) systems are
widely used in many applications. In some applications, the ownership of an
RFID tag might change. To provide a solution, researchers have proposed several
ownership transfer protocols based on encryption functions for RFID-tagged
objects. In this paper, we consider the security of Kapoor and Piramuthu [3]
ownership transfer protocol and Kapoor et al. [4] ownership transfer protocol.
More precisely, we present de-synchronization attacks against these protocols. The
success probability of all attacks is 1 while the complexity is only two runs
of protocol. Finally, we present our suggestions to improve the security of
these protocols.
Keywords: RFID,
cryptanalysis, ownership transfer protocol, de-synchronization attack.
Received February 4, 2014; accepted December 23, 2015