Paper 2022/044

Security and Privacy Analysis of Recently Proposed ECC-Based RFID Authentication Schemes

Atakan Arslan and Muhammed Ali Bingöl

Abstract

Elliptic Curve Cryptography (ECC) has been popularly used in RFID authentication protocols to efficiently overcome many security and privacy issues. Even if the strong cryptography primitives of ECC are utilised in the authentication protocols, the schemes are alas far from providing security and privacy properties as desired level. In this paper, we analyze four up-to-minute ECC based RFID authentication schemes proposed by Gasbi et al., Benssalah et al., Kumar et al., and Agrahari and Varma. The authors claim that their schemes provide prominent and important security and privacy requirements. However, we have shown some crucial vulnerabilities of the schemes against their allegations. We attack to Gasbi et al.'s protocol by using transmitted messages in insecure channel and exploiting the message relations which points a specific tag, and show that the scheme does not provide tag anonymity/untraceability, forward and backward security and the scheme has performance problems. Moreover, we demonstrate that Kumar et al., and Agrahari and Varma's schemes do not achieve forward and backward security because the schemes are not designed to eliminate the advantage of an adversary obtaining full knowledge of a tag from by attack definition. We also show that Benssalah et al.'s scheme suffers from tag anonymity/untraceability, forward and backward security when the pseudonym of a tag is transmitted in insecure channel somehow without updating.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint. MINOR revision.
Keywords
RFIDPrivacySecurityECC
Contact author(s)
atknarsln @ gmail com
History
2022-01-14: received
Short URL
https://ia.cr/2022/044
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/044,
      author = {Atakan Arslan and Muhammed Ali Bingöl},
      title = {Security and Privacy Analysis of Recently Proposed ECC-Based RFID Authentication Schemes},
      howpublished = {Cryptology ePrint Archive, Paper 2022/044},
      year = {2022},
      note = {\url{https://eprint.iacr.org/2022/044}},
      url = {https://eprint.iacr.org/2022/044}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.