In Cryptanalysis and Improvement of the Zhu et al.'s Authentication Protocol

Mahdi Azizi, Abdolrasoul Mirghadri, Nasour Bagheri

Abstract


Zhu et al. recently have proposed an authentication prpotocol for
RFID systems. In this paper, we analyze its security and explain its
security drawbacks. More precisely, we present traceability attack
against this protocol. In addition, we propose an improvement on the
Zhu et al.'s to resists these security drawbacks. Finally, we
investigate the formal security of the improved protocol based on the
BAN logic method.

DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.2077

 


Full Text:

PDF

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

The International Journal of Informatics and Communication Technology (IJ-ICT)
p-ISSN 2252-8776, e-ISSN 2722-2616
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).

Web Analytics View IJICT Stats