Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues
Title | Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Jin, Y., Zhu, H., Shi, Z., Lu, X., Sun, L. |
Conference Name | 2015 IEEE International Conference on Communications (ICC) |
Date Published | jun |
Keywords | cryptanalysis, cryptographic protocols, cryptography, desynchronization attack, Information systems, Ownership Transfer, privacy, probability, protocol, Protocols, pubcrawl170112, quadratic residue, Quadratic Residues, radio frequency identification, radiofrequency identification, RFID, RFID-OT protocol improvement, secure RFID tag ownership transfer protocol, security, security analysis, Servers, supply chain, Supply chains |
Abstract | The ownership transfer of RFID tag means a tagged product changes control over the supply chain. Recently, Doss et al. proposed two secure RFID tag ownership transfer (RFID-OT) protocols based on quadratic residues. However, we find that they are vulnerable to the desynchronization attack. The attack is probabilistic. As the parameters in the protocols are adopted, the successful probability is 93.75%. We also show that the use of the pseudonym of the tag h(TID) and the new secret key KTID are not feasible. In order to solve these problems, we propose the improved schemes. Security analysis shows that the new protocols can resist in the desynchronization attack and other attacks. By optimizing the performance of the new protocols, it is more practical and feasible in the large-scale deployment of RFID tags. |
URL | https://ieeexplore.ieee.org/document/7249481 |
DOI | 10.1109/ICC.2015.7249481 |
Citation Key | jin_cryptanalysis_2015 |
- quadratic residue
- supply chains
- Supply Chain
- Servers
- Security analysis
- security
- secure RFID tag ownership transfer protocol
- RFID-OT protocol improvement
- RFID
- radiofrequency identification
- radio frequency identification
- Quadratic Residues
- cryptanalysis
- pubcrawl170112
- Protocols
- protocol
- probability
- privacy
- Ownership Transfer
- Information systems
- desynchronization attack
- Cryptography
- Cryptographic Protocols