Paper 2009/332

Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC

Ton van Deursen and Sasa Radomirovic

Abstract

It is well-known that protocols that satisfy a security property when executed in isolation do not necessarily satisfy the same security property when they are executed in an environment containing other protocols. We demonstrate this fact on a family of recently proposed RFID protocols by Lee, Batina, and Verbauwhede. We invalidate the authentication and untraceability claims made for several of the family's protocols. We also present man-in-the-middle attacks on untraceability in all of the protocols in the family. Similar attacks can be carried out on some other protocols in the literature, as well. We briefly indicate how to repair the protocols.

Note: Removed one statement about a candidate hash function.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Unknown where it was published
Keywords
RFID protocolsauthenticationuntraceabilitycompositionality
Contact author(s)
ton vandeursen @ uni lu
History
2009-07-08: last of 2 revisions
2009-07-07: received
See all versions
Short URL
https://ia.cr/2009/332
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2009/332,
      author = {Ton van Deursen and Sasa Radomirovic},
      title = {Untraceable {RFID} protocols are not trivially composable: Attacks on the revision of {EC}-{RAC}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2009/332},
      year = {2009},
      url = {https://eprint.iacr.org/2009/332}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.