메뉴 건너뛰기




Volumn 3, Issue 7, 2008, Pages 20-27

Cryptanalysis of some RFID authentication protocols

Author keywords

De synchronization attack; Impersonation; RFID

Indexed keywords

AUTHENTICATION; RADIO FREQUENCY IDENTIFICATION (RFID); SYNCHRONIZATION;

EID: 77949562527     PISSN: 17962021     EISSN: None     Source Type: Journal    
DOI: 10.4304/jcm.3.7.20-27     Document Type: Conference Paper
Times cited : (32)

References (15)
  • 1
    • 38048999003 scopus 로고    scopus 로고
    • Data Management in RFID Applications
    • International Conference on Database and Expert Systems Applications
    • D. Lin, H. G. Elmongui, E. Bertino, and B. C. Ooi, "Data Management in RFID Applications", International Conference on Database and Expert Systems Applications, LNCS 4653, pp. 434-444, 2007.
    • (2007) LNCS , vol.4653 , pp. 434-444
    • Lin, D.1    Elmongui, H.G.2    Bertino, E.3    Ooi, B.C.4
  • 2
    • 33845531085 scopus 로고    scopus 로고
    • Radio frequency identification: Adversary model and attacks on existing protocols
    • Technical Report LASEC-REPORT-2005-001, EPFL, Lausanne, Switzerland, September
    • G. Avoine. "Radio frequency identification: adversary model and attacks on existing protocols", Technical Report LASEC-REPORT-2005-001, EPFL, Lausanne, Switzerland, September 2005.
    • (2005)
    • Avoine, G.1
  • 3
    • 24644501824 scopus 로고    scopus 로고
    • Challenge-Response Based on RFID Authentication Protocol for Distributed Database Environment
    • SPC 2005
    • K. Rhee, J. Kwak, S. Kim and D. Won, "Challenge-Response Based on RFID Authentication Protocol for Distributed Database Environment", SPC 2005, LNCS 3450, pp. 70-84, 2005.
    • (2005) LNCS , vol.3450 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3    Won, D.4
  • 4
    • 34247218520 scopus 로고    scopus 로고
    • RFID Mutual Authentication Scheme based on Synchronized Secret Information
    • S. Lee, T. Asano and K. Kim, "RFID Mutual Authentication Scheme based on Synchronized Secret Information", SCIS'06, 2006.
    • (2006) SCIS'06
    • Lee, S.1    Asano, T.2    Kim, K.3
  • 5
    • 38149047468 scopus 로고    scopus 로고
    • Low-Cost and Strong-Security RFID Authentication Protocol
    • EUC Workshops 2007
    • J.C. Ha, S.J. Moon, J. M. G. Nieto and C. Boyd, "Low-Cost and Strong-Security RFID Authentication Protocol", EUC Workshops 2007, LNCS 4809, pp. 795-807, 2007.
    • (2007) LNCS , vol.4809 , pp. 795-807
    • Ha, J.C.1    Moon, S.J.2    Nieto, J.M.G.3    Boyd, C.4
  • 6
    • 48049085420 scopus 로고    scopus 로고
    • RFID Protocol enabling Ownership Transfer to protect against Traceability and DoS attacks
    • H. Lei, T.J. Cao, "RFID Protocol enabling Ownership Transfer to protect against Traceability and DoS attacks", International Symposium on Data, Privacy, & E-Commerce, pp. 508-510, 2007.
    • (2007) International Symposium on Data, Privacy, & E-Commerce , pp. 508-510
    • Lei, H.1    Cao, T.J.2
  • 8
    • 56749103027 scopus 로고    scopus 로고
    • B. Song, C. Mitchell, RFID authentication protocol for low-cost tags, First ACM Conference on Wireless Security, WiSec 2008, pp.40-147, 2008.
    • B. Song, C. Mitchell, "RFID authentication protocol for low-cost tags", "First ACM Conference on Wireless Security", WiSec 2008, pp.40-147, 2008.
  • 10
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity
    • H. -Y. Chien, "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity", IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, 2007, pp. 337-340.
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.4 , pp. 337-340
    • Chien, H.-Y.1
  • 11
    • 36248977046 scopus 로고    scopus 로고
    • Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols
    • May
    • T. Li, G. Wang, "Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols", 22nd IFIP TC-11 Int'l Information Security Conf., May 2007.
    • (2007) 22nd IFIP TC-11 Int'l Information Security Conf
    • Li, T.1    Wang, G.2
  • 12
    • 60449095092 scopus 로고    scopus 로고
    • Security Analysis of the SASI Protocol
    • 20 May, IEEE Computer Society Digital Library. IEEE Computer Society, 26 May 2008
    • T. Cao, E. Bertino, H. Lei, "Security Analysis of the SASI Protocol", IEEE Transactions on Dependable and Secure Computing, 20 May 2008. IEEE Computer Society Digital Library. IEEE Computer Society, 26 May 2008 http://doi.ieeecomputersociety.org /10.1109/TDSC.2008.32
    • (2008) IEEE Transactions on Dependable and Secure Computing
    • Cao, T.1    Bertino, E.2    Lei, H.3
  • 13
    • 78651592502 scopus 로고    scopus 로고
    • A novel mutual authentication scheme based on quadratic residues
    • J.-S. Chou, G.-C. Lee, C.-J. Chan, "A novel mutual authentication scheme based on quadratic residues", Cryptology ePrint Archive, http://eprint.iacr.org/2007/224
    • Cryptology ePrint Archive
    • Chou, J.-S.1    Lee, G.-C.2    Chan, C.-J.3
  • 14
    • 78651538368 scopus 로고    scopus 로고
    • Weaknesses of a Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems
    • Feb
    • H.-C. Hsiang, "Weaknesses of a Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems", 2008 RFID workshop, Feb. 2008
    • (2008) 2008 RFID workshop
    • Hsiang, H.-C.1
  • 15
    • 46749130059 scopus 로고    scopus 로고
    • A novel mutual authentication scheme based on quadratic residues
    • August
    • Y. Chen, "A novel mutual authentication scheme based on quadratic residues", Computer Network, Vol. 52, no. 12, pp. 2373-2380, August 2008.
    • (2008) Computer Network , vol.52 , Issue.12 , pp. 2373-2380
    • Chen, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.