Comment on "cryptanalysis of a novel ultralightweight mutual authentication protocol for IoT devices using RFID tags"

Shao Cheng Huang, Chia Wei Tsai, Tzonelih Hwang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

To protect the security of IoT devices, Tewari and Gupta proposed an ultralightweight mutual-authentication protocol for an RFID system. In the protocol, only two simple bitwise operations (XOR and rotation) are used to achieve two-pass mutual authentication. Although the protocol is efficient, we observe that the protocol has a security vulnerability. This security weakness could cause the leaking of all secrets in RFID tags. Compared with other researches that also proposed attacks for Tewari and Gupta's protocol, our attack needs less time and smaller space complexity to implement. The time complexity of our attack is O(1), and the attack can successfully crack the protocol with 100% probability.

Original languageEnglish
Title of host publicationProceedings of the 2018 International Conference on Data Science and Information Technology, DSIT 2018
PublisherAssociation for Computing Machinery
Pages23-27
Number of pages5
ISBN (Electronic)9781450365215
DOIs
Publication statusPublished - 2018 Jul 20
Event2018 International Conference on Data Science and Information Technology, DSIT 2018 - Singapore, Singapore
Duration: 2018 Jul 202018 Jul 22

Publication series

NameACM International Conference Proceeding Series

Other

Other2018 International Conference on Data Science and Information Technology, DSIT 2018
Country/TerritorySingapore
CitySingapore
Period18-07-2018-07-22

All Science Journal Classification (ASJC) codes

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Comment on "cryptanalysis of a novel ultralightweight mutual authentication protocol for IoT devices using RFID tags"'. Together they form a unique fingerprint.

Cite this