Cryptology ePrint Archive: Report 2015/615

Security Analysis of Niu et al. Authentication and Ownership Management Protocol

Nasour Bagheri, Masoumeh Safkhani and Hoda Jannati

Abstract: Over the past decade, besides authentication, ownership management protocols have been suggested to transfer or delegate the ownership of RFID tagged items. Recently, Niu et al. have proposed an authentication and ownership management protocol based on 16-bit pseudo random number generators and exclusive-or operations which both can be easily implemented on low-cost RFID passive tags in EPC global Class-1 Generation-2 standard. They claim that their protocol offers location and data privacy and also resists against desynchronization attack. In this paper, we analyze the security of their proposed authentication and ownership management protocol and show that the protocol is vulnerable to secret disclosure and desynchronization attacks. The complexity of most of the attacks are only two runs of the protocol and the success probability of the attacks are almost 1.

Category / Keywords: cryptographic protocols / RFID, ownership transfer, ownership delegation, secret disclosure attack, desynchronization attack

Date: received 22 Jun 2015, last revised 22 Jun 2015

Contact author: na bagheri at gmail com, nbagheri@srttu edu

Available format(s): PDF | BibTeX Citation

Note: The work is on progress and the current may be revised.

Version: 20150630:182549 (All versions of this report)

Short URL: ia.cr/2015/615

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]