ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

On the Security of Two Ownership Transfer Protocols and Their Improvements

Journal: The International Arab Journal of Information Technology (Vol.15, No. 1)

Publication Date:

Authors : ;

Page : 87-93

Keywords : RFID; cryptanalysis; ownership transfer protocol; de-synchronization attack.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In recent years, Radio Frequency Identification (RFID) systems are widely used in many applications. In some applications, the ownership of an RFID tag might change. To provide a solution, researchers have proposed several ownership transfer protocols based on encryption functions for RFID-tagged objects. In this paper, we consider the security of Kapoor and Piramuthu [3] ownership transfer protocol and Kapoor et al. [4] ownership transfer protocol. More precisely, we present de-synchronization attacks against these protocols. The success probability of all attacks is 1 while the complexity is only two runs of protocol. Finally, we present our suggestions to improve the security of these protocols.

Last modified: 2019-04-29 19:01:12