Author :
Barasz, Mihaly ; Boros, Balazs ; Ligeti, Peter ; Loja, Krisztina ; Nagy, Daniel A.
Author_Institution :
ELTECRYPT Research Group, Department of Computer Science, Eötvös University, 1117 Budapest, Pázmány Péter sétány 1/c, Hungary
Abstract :
We have broken EMAP (Efficient Mutual Authentication Protocol), which is a mutual authentication protocol between RFID tags and RFID readers. We give an algorithm, which breaks the protocol after eavesdropping only a few rounds. Assuming that one can eavesdrop a few consecutive rounds of authentications for the same RFID tag (the expected number for the presented algorithm is about 9, but it is possible to reduce this number to about 3.5), the attacker learns the identity number of the tag and every common secret shared by the tag and the reader. This means that in future authentication rounds, the attacker can successfully impersonate the targeted tag. Our breaking procedure is fully passive as opposed to the active attack described in [2].
Keywords :
Authentication; Computer science; Cryptography; Intrusion detection; Mathematics; Protocols; RFID tags; Radiofrequency identification; Random number generation; Telematics; EMAP; Mutual Authentication; Passive Attack; RFID; Reader; Tag;
Conference_Titel :
Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on
Conference_Location :
Nice, France
Print_ISBN :
978-1-4244-0974-7
Electronic_ISBN :
978-1-4244-0975-4
DOI :
10.1109/SECCOM.2007.4550374