Paper 2011/704

Security Analysis of a PUF based RFID Authentication Protocol

Masoumeh Safkhani, Nasour Bagheri, and Majid Naderi

Abstract

In this paper we consider the security of a PUF based RFID Authentication protocol which has been recently proposed by Bassil et al. The designers have claimed that their protocol offers immunity against a broad range of attacks while it provides excellent performance. However, we prove in contrary to its designers claim that this protocol does not provide any security. We present an efficient secret disclosure attack which retrieves all secret parameters of the protocol. Given those secret parameters, it would be trivial to apply any other attack in the context on the protocol. However, to highlight other weaknesses of the protocol we present extra reader traceability, impersonation and desynchronization attacks that do not require disclosing the secret parameters necessarily. Success probability of all mentioned attacks is almost ``1'' while the complexity is at most two runs of protocol.

Metadata
Available format(s)
PDF PS
Category
Cryptographic protocols
Publication info
Published elsewhere. Unknown where it was published
Keywords
RFIDAuthenticationPUFTraceability AttackReader Impersonation AttackTag impersonation AttackDesynchronization Attack
Contact author(s)
nbagheri @ srttu edu
na bagheri @ gmail com
History
2012-01-09: revised
2011-12-27: received
See all versions
Short URL
https://ia.cr/2011/704
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2011/704,
      author = {Masoumeh Safkhani and Nasour Bagheri and Majid Naderi},
      title = {Security Analysis of a {PUF} based {RFID} Authentication Protocol},
      howpublished = {Cryptology {ePrint} Archive, Paper 2011/704},
      year = {2011},
      url = {https://eprint.iacr.org/2011/704}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.