Loading [a11y]/accessibility-menu.js
Breaking EMAP | IEEE Conference Publication | IEEE Xplore

Abstract:

We have broken EMAP (Efficient Mutual Authentication Protocol), which is a mutual authentication protocol between RFID tags and RFID readers. We give an algorithm, which ...Show More

Abstract:

We have broken EMAP (Efficient Mutual Authentication Protocol), which is a mutual authentication protocol between RFID tags and RFID readers. We give an algorithm, which breaks the protocol after eavesdropping only a few rounds. Assuming that one can eavesdrop a few consecutive rounds of authentications for the same RFID tag (the expected number for the presented algorithm is about 9, but it is possible to reduce this number to about 3.5), the attacker learns the identity number of the tag and every common secret shared by the tag and the reader. This means that in future authentication rounds, the attacker can successfully impersonate the targeted tag. Our breaking procedure is fully passive as opposed to the active attack described in [2].
Date of Conference: 17-21 September 2007
Date Added to IEEE Xplore: 24 June 2008
ISBN Information:
Conference Location: Nice, France

References

References is not available for this document.