Provided by: Creative Commons
Date Added: May 2013
In an authentication process of RFID systems the tag/reader/server communicates over an insecure channel due to "Weak" authentication protocols. The specification has some serious security problems, so the password either leak directly over the network or leaks the sufficient information i.e., while performing authentication that allow hackers to deduce or guess the password. To overcome this weak authentication a specially designed pad generation function is used to improve security. The pad gen function is used to produce a cover-coding pad to mask the tag's access password before the data transmission.