Title :
Security Enhancement for a Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems
Author :
Hsiang, Han-Cheng ; Kuo, Hsiang-Chou ; Shih, Wei-Kuan
Author_Institution :
Dept. of Comput. Sci., Nat. Tsing Hua Univ., Tsing Hua, Taiwan
Abstract :
In 2004, Ari Juels [1] proposed a Yoking-Proofs protocol for RFID systems. The goal is to permit tags to generate a proof which is verifiable off-line by a trusted entity even when the readers are potentially untrusted. But the protocol not only doesn¿t possess the anonymity property but also suffers from both the replay and off-line attacks. In 2005, Wong et al. [3] proposed an authentication scheme on RFID passive tags, attempting to as a standard for apparel products. However, the protocol suffers from the known-plain text attack. Recently Chou et al. proposed a scheme to improve both of the above schemes and claimed that their scheme is anonymous. In this paper, we point out that Chou et al.¿s scheme is vulnerable to the replay attack, the reflection attack and the server spoofing attack. A modification of Chou et al.¿s scheme to enhance their security is proposed. Our scheme is suitable for applications with high security requirement.
Keywords :
message authentication; protocols; radiofrequency identification; telecommunication security; Chou et al scheme; RFID passive tag systems; mutual authentication scheme; protocols; quadratic residues scheme; radiofrequency identification; security enhancement; Authentication; Communication system security; Computer security; Data security; Information security; National security; Protocols; Radio frequency; Radiofrequency identification; Reflection; RFID system; binary search; mutual authentication; quadratic residues;
Conference_Titel :
Future Generation Communication and Networking, 2008. FGCN '08. Second International Conference on
Conference_Location :
Hainan Island
Print_ISBN :
978-0-7695-3431-2
DOI :
10.1109/FGCN.2008.113