Computer Science – Cryptography and Security
Scientific paper
2011-02-04
International Journal of Distributed and Parallel systems, Volume 2, Number 1, pp. 103-114. 2011
Computer Science
Cryptography and Security
17 pages, 2 figures, 1 table, International Journal of Distributed and Parallel systems
Scientific paper
10.5121/ijdps.2011.2109
Radio Frequency Identification (RFID) is appearing as a favorite technology for automated identification, which can be widely applied to many applications such as e-passport, supply chain management and ticketing. However, researchers have found many security and privacy problems along RFID technology. In recent years, many researchers are interested in RFID authentication protocols and their security flaws. In this paper, we analyze two of the newest RFID authentication protocols which proposed by Fu et al. and Li et al. from several security viewpoints. We present different attacks such as desynchronization attack and privacy analysis over these protocols.
Alaghband Mahdi R.
Gardeshi Mahmoud
Habibi Mohammad Hassan
No associations
LandOfFree
Cryptanalysis of two mutual authentication protocols for low-cost RFID does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Cryptanalysis of two mutual authentication protocols for low-cost RFID, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptanalysis of two mutual authentication protocols for low-cost RFID will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-491611