Browse > Article

Unproved Mutual Authentication Scheme based on Quadratic Residue for RFID  

Park, Han-Nah (고려대학교 정보보호학과)
Kim, Se-Il (고려대학교 정보보호학과)
Chun, Ji-Young (고려대학교 정보보호학과)
Lee, Dong-Hoon (고려대학교 정보보호학과)
Abstract
Recently, Chen et al.'s proposed mutual authentication scheme based on the quadratic resiidue, finding the squaring root problem, for avoiding exhaustive search on the server. But, if a malicious reader sends same random value, the tag is traced by an adversary. Moreover, there is realization problem because of its limited ability to compute squaring and hash function. In this paper, we analyze Chen et al.'s scheme and its weakness. Furthermore we present an improved mutual authentication scheme based on the quadratic residue which solves the tracing problem by generating random value on the tag and uses only squaring. We also make the scheme satisfy to forward secrecy without updating and synchronizing and avoid exhaustive search.
Keywords
RFID; mutual authentication; quadratic residue; low-cost tag;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Molnar, D. Wagner, Privacy and security in library RFID: issues, practices, and architectures, Conference on Computer and Communications Secu-rity CCS'04, pp. 210-219, 2004   DOI
2 M. Ohkudo, K. Suzki, S. Kinoshita, Cryptographic approach to privacy-friendly tags, RFID Privacy Workshop, 2003
3 J. Yang, K. Ren, K. Kim, Security and privacy on authentication protocol for low-cost radio, the 2005 Symposium on Cryptography and Information Se-curity, 2005
4 J. Yang, J. Park, H. Lee, K. Kim, Mutual authen-tication protocol for low-cost RFID, Handout of the Encrypt Workshop on RFID and Lightweight Crypto, 2005
5 CC Tan, B Sheng, Q Li, Serverless search and auth-entication protocols for RFID, IEEE PerCom, 2007   DOI
6 S.A. Weis, S.E. Sarma, R,L.Rivest, D.W.Engels, Security and privacy aspects of low-cost radio frequency identification systems, Security in Per-vasive Computing 2003, LNCS No.2802, pp. 201-212, 2004   DOI
7 Y. Chen, J. Chou, H. Sun, A novel mutual authentication scheme based on quadratic residues for RFID systems, computer networks 52, pp. 2373-2380, 2008   DOI   ScienceOn