Two Security Problems of RFID Security Method with Ownership Transfer

被引:19
作者
Yoon, Eun-Jun [1 ]
Yoo, Kee-Young [2 ]
机构
[1] Kyungpook Natl Univ, Sch Elect Engn & Comp Sci, Taegu 702701, South Korea
[2] Kyungpook Natl Univ, Dept Comp Engn, Taegu 702701, South Korea
来源
2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS | 2008年
关键词
RFID; Authentication; Cryptanalysis; Forward secrecy; DoS attack;
D O I
10.1109/NPC.2008.64
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Radio Frequency Identification (RFID) is a technology that allows automatic identification and data capture by using radio frequencies. In 2006, Osaka et al. proposed a RFID security method based on a hash function and a symmetric key cryptosystem. Osaka et al. claimed that their proposed RFID security method achieves the following security requirements such as (1) Indistinguishability, (2) Forward Security, (3) Replay Attack, (4) Tag Killing, and (5) Ownership Transfer Unlike their claims, the current paper points out two security problems of Osaka et al.'s RFID security method. To mitigate these security breaches, we propose an improved RFID security method.
引用
收藏
页码:68 / +
页数:2
相关论文
共 8 条
[1]  
AVOINE G, 2005, LNCS, V3897, P291
[2]  
Han DG, 2006, LECT NOTES COMPUT SC, V3982, P375
[3]  
Kinoshita S., 2007, IPSJ, V45, P2021
[4]  
Menezes A. J, 1997, HDB APPL CRYPTOGRAPH
[5]  
OHKUBO M, 2003, RFIC PRIV WORKSH
[6]   An efficient and secure RFID security method with ownership transfer [J].
Osaka, Kyosuke ;
Takagi, Tsuyoshi ;
Yamazaki, Kenichi ;
Takahashi, Osamu .
2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, :1090-1095
[7]  
Rhee K, 2005, LECT NOTES COMPUT SC, V3450, P70
[8]  
Saito J., 2005, IPSJ S SERIES, P283