![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Implementation of secret disclosure attack against two IoT lightweight authentication protocols
Recently, security of the Internet of things on mobile phones, especially the fifth generation (5G), has attracted much attention. In this regard, state-of-the-art authentication protocols have been proposed w...
-
Article
An improved low-cost yoking proof protocol based on Kazahaya’s flaws
Peris-Lopez et al. (J Netw Comput Appl 34:833–845, 2011) recently provided some guidelines that should be followed to design a secure yoking proof protocol. In addition, conforming to those guidelines and EPC C1-...
-
Article
Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things
Internet of Things (IoT) is a technology in which for any object the ability to send data via communications networks is provided. Ensuring the security of Internet services and applications is an important fa...
-
Chapter and Conference Paper
Security Analysis of Niu et al. Authentication and Ownership Management Protocol
Over the past decade, besides authentication, ownership management protocols have been suggested to transfer or delegate the ownership of RFID tagged items. Recently, Niu et al. have proposed an authentication an...
-
Article
Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol
EPC class 1 Generation-2 (or in short term EPC-C1 G2) is one of the most important standards for RFID passive tags. However, the original protocol is known to be insecure. To improve the security of this stand...
-
Chapter and Conference Paper
Desynchronization and Traceability Attacks on RIPTA-DA Protocol
Recently Gao et al. proposed a lightweight RFID mutual authentication protocol [3] to resist against intermittent position trace attacks and desynchronization attacks and called it RIPTA-DA. They also verified th...
-
Chapter and Conference Paper
On the Security of Two RFID Mutual Authentication Protocols
In this paper, the security of two recent RFID mutual authentication protocols are investigated. The first protocol is a scheme proposed by Huang et al. [7] and the second one by Huang, Lin and Li [6]. We show th...
-
Chapter and Conference Paper
On the Security of Tan et al. Serverless RFID Authentication and Search Protocols
In this paper, we analyze the security of the mutual authentication and search protocols recently proposed by Tan et al. [20]. Our security analysis clearly highlights important security pitfalls in these. More p...
-
Chapter and Conference Paper
Another Fallen Hash-Based RFID Authentication Protocol
In this paper, we scrutinize the security of an RFID protocol [9], which has been recently proposed, and show important vulnerabilities. Our first attack is a passive one that can disclose all secret informati...
-
Chapter and Conference Paper
On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.’s Protocol
Authentication is one of the most basic and important cryptographic tasks. Mutual authentication protocols play a crucial role on the security of RFID systems. In this paper, we consider the security of a rece...
-
Chapter and Conference Paper
Cryptanalysis of Tav-128 Hash Function
Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit lig...