International Conference on Computer Systems and Mathematical Sciences |
Foundation of Computer Science USA |
ICCSMS2016 - Number 1 |
July 2017 |
Authors: Sonam Devgan Kaul, Amit K. Awasthi |
dc86f00f-0c4c-4e44-a3dd-b90115a66f57 |
Sonam Devgan Kaul, Amit K. Awasthi . Security Flaws in Two Recently Proposed RFID Authentication Protocols. International Conference on Computer Systems and Mathematical Sciences. ICCSMS2016, 1 (July 2017), 1-8.
On the basis of Vaudenay's untraceability model, this paper describes cryptanalyses of recently proposed Zhuang et al. 's ultralightweight RFID authentication protocol for low cost tags R2AP and Dehkordi and Farzaneh's improved hash based RFID mutual authentication protocol. This paper formally demonstrates that R2AP is insecure and does not attain even Narrow Forward privacy level of security. Additionally, R2AP protocol is traceable and suffers from impersonation attack. Also Dehkordi and Farzaneh's proposed protocol is impractical formally as it does not attain even Narrow Forward privacy level of security.