Cryptology ePrint Archive: Report 2013/399

Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol

Roel Peeters and Jens Hermans

Abstract: We show that the Liao and Hsiao's protocol achieves neither tag-authentication nor privacy.

Category / Keywords: cryptographic protocols / RFID, private authentication, attack

Date: received 17 Jun 2013, last revised 18 Jun 2013

Contact author: roel peeters at esat kuleuven be

Available format(s): PDF | BibTeX Citation

Version: 20130618:140936 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]