Visible to the public Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues

TitleCryptanalysis and improvement of two RFID-OT protocols based on quadratic residues
Publication TypeConference Paper
Year of Publication2015
AuthorsJin, Y., Zhu, H., Shi, Z., Lu, X., Sun, L.
Conference Name2015 IEEE International Conference on Communications (ICC)
Date Publishedjun
Keywordscryptanalysis, cryptographic protocols, cryptography, desynchronization attack, Information systems, Ownership Transfer, privacy, probability, protocol, Protocols, pubcrawl170112, quadratic residue, Quadratic Residues, radio frequency identification, radiofrequency identification, RFID, RFID-OT protocol improvement, secure RFID tag ownership transfer protocol, security, security analysis, Servers, supply chain, Supply chains

The ownership transfer of RFID tag means a tagged product changes control over the supply chain. Recently, Doss et al. proposed two secure RFID tag ownership transfer (RFID-OT) protocols based on quadratic residues. However, we find that they are vulnerable to the desynchronization attack. The attack is probabilistic. As the parameters in the protocols are adopted, the successful probability is 93.75%. We also show that the use of the pseudonym of the tag h(TID) and the new secret key KTID are not feasible. In order to solve these problems, we propose the improved schemes. Security analysis shows that the new protocols can resist in the desynchronization attack and other attacks. By optimizing the performance of the new protocols, it is more practical and feasible in the large-scale deployment of RFID tags.

Citation Keyjin_cryptanalysis_2015