Cryptology ePrint Archive: Report 2022/044

Security and Privacy Analysis of Recently Proposed ECC-Based RFID Authentication Schemes

Atakan Arslan and Muhammed Ali Bingöl

Abstract: Elliptic Curve Cryptography (ECC) has been popularly used in RFID authentication protocols to efficiently overcome many security and privacy issues. Even if the strong cryptography primitives of ECC are utilised in the authentication protocols, the schemes are alas far from providing security and privacy properties as desired level. In this paper, we analyze four up-to-minute ECC based RFID authentication schemes proposed by Gasbi et al., Benssalah et al., Kumar et al., and Agrahari and Varma. The authors claim that their schemes provide prominent and important security and privacy requirements. However, we have shown some crucial vulnerabilities of the schemes against their allegations. We attack to Gasbi et al.'s protocol by using transmitted messages in insecure channel and exploiting the message relations which points a specific tag, and show that the scheme does not provide tag anonymity/untraceability, forward and backward security and the scheme has performance problems. Moreover, we demonstrate that Kumar et al., and Agrahari and Varma's schemes do not achieve forward and backward security because the schemes are not designed to eliminate the advantage of an adversary obtaining full knowledge of a tag from by attack definition. We also show that Benssalah et al.'s scheme suffers from tag anonymity/untraceability, forward and backward security when the pseudonym of a tag is transmitted in insecure channel somehow without updating.

Category / Keywords: cryptographic protocols / RFID, Privacy, Security, ECC

Date: received 12 Jan 2022

Contact author: atknarsln at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20220114:073431 (All versions of this report)

Short URL: ia.cr/2022/044


[ Cryptology ePrint archive ]