Attack on Liao and Hsiao's Secure ECC-Based RFID Authentication Scheme Integrated with ID-Verifier Transfer Protocol

The authors proposed a private RFID authentication protocol based on elliptic curve cryptography. Their motivation to switch from symmetric key cryptography to public key cryptography is that this a prerequisite to achieve forward private RFID authentication efficiently at the server (i.e. constant size look-up). To minimize the hardware implementation area, the authors only make use of an ECC coprocessor and do not require additional cryptographic building blocks, e.g., hash functions or block ciphers. The authors claim that, albeit their protocol being very inefficient with 5 EC multiplications, it is the only ECC-based RFID authentication scheme satisfying all the requirements of RFID systems, including mutual authentication, confidentiality, anonymity, forward security and scalability.
Provided by: Katholieke Universiteit Leuven Topic: Security Date Added: Jun 2013 Format: PDF

Find By Topic