In this paper, we analyze the security of three authentication protocols which have recently been proposed by Morshed et al. Our security analysis clearly highlights important security pitfalls in these protocols which leads to their vulnerability against traceability. The complexity of the proposed attacks are only several runs of the protocols while the adversary's advantages to trace the tagged object are maximal.
Category / Keywords: cryptographic protocols / RFID, Ubiquitous, Mutual Authentication, Traceability. Date: received 12 Jun 2012 Contact author: nbagheri at srttu edu,Na bagheri@gmail com Available format(s): PDF | BibTeX Citation Version: 20120622:193218 (All versions of this report) Short URL: ia.cr/2012/334 Discussion forum: Show discussion | Start new discussion