Cryptanalysis of two mutual authentication protocols for low-cost RFID

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

17 pages, 2 figures, 1 table, International Journal of Distributed and Parallel systems

Scientific paper

10.5121/ijdps.2011.2109

Radio Frequency Identification (RFID) is appearing as a favorite technology for automated identification, which can be widely applied to many applications such as e-passport, supply chain management and ticketing. However, researchers have found many security and privacy problems along RFID technology. In recent years, many researchers are interested in RFID authentication protocols and their security flaws. In this paper, we analyze two of the newest RFID authentication protocols which proposed by Fu et al. and Li et al. from several security viewpoints. We present different attacks such as desynchronization attack and privacy analysis over these protocols.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Cryptanalysis of two mutual authentication protocols for low-cost RFID does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Cryptanalysis of two mutual authentication protocols for low-cost RFID, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptanalysis of two mutual authentication protocols for low-cost RFID will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-491611

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.