Vulnerability Analysis of Emap - an Efficient RFID Mutual Authentication Protocol
Conference Proceeding Article
In this paper, we analyze the security vulnerabilities of EMAP, an efficient RFID mutual authentication protocol recently proposed by Peris-Lopez et al. (2006). We present two effective attacks, a de-synchronization attack and a full-disclosure attack, against the protocol. The former permanently disables the authentication capability of a RFID tag by destroying synchronization between the tag and the RFID reader. The latter completely compromises a tag by extracting all the secret information stored in the tag. The de-synchronization attack can be carried out in just round of interaction in EMAP while the full-disclosure attack is accomplished across several runs of EMAP. We also discuss ways to counter the attacks
Information Security and Trust
Proceedings of the 2nd the International Conference on Availability, Reliability and Security
LI, Tieyan and DENG, Robert H..
Vulnerability Analysis of Emap - an Efficient RFID Mutual Authentication Protocol. (2006). Proceedings of the 2nd the International Conference on Availability, Reliability and Security. 238-245. Research Collection School Of Information Systems.
Available at: http://ink.library.smu.edu.sg/sis_research/529