Mobility

Untraceable RFID Protocols Are Not Trivially Composable: Attacks on the Revision of EC-RAC

Download Now Free registration required

Executive Summary

It is well-known that protocols that satisfy a security property when executed in isolation do not necessarily satisfy the same security property when they are executed in an environment containing other protocols. This paper demonstrates this fact on a family of recently proposed RFID protocols by Lee, Batina, and Verbauwhede. This paper invalidates the authentication and untraceability claims made for several of the family's protocols. This paper also presents man-in-the-middle attacks on untraceability in all of the protocols in the family.

  • Format: PDF
  • Size: 91 KB