Desynchronization and Traceability Attacks on RIPTA-DA Protocol

Recently Gao et al. proposed a lightweight RFID mutual authentication protocol [3] to resist against intermittent position trace attacks and desynchronization attacks and called it RIPTA-DA. They also verified their protocol’s security by data reduction method with the learning parity with noise (LPN) and also formally verified the functionality of the proposed scheme by Colored Petri Nets. In this paper, we investigate RIPTA-DA’s security. We present an efficient secret disclosure attack against the protocol which can be used to mount both de-synchronization and traceability attacks against the protocol. Thus our attacks show that RIPTA-DA protocol is not a RIPTA-DA.

[1]  Juan E. Tapiador,et al.  Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol , 2009, WISA.

[2]  Julio C. Hernandez-Castro,et al.  RFID Specification Revisited , 2008 .

[3]  Juan E. Tapiador,et al.  EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.

[4]  Iec Jtc . Subcommittee Sc Parameters for air interface communications at 860 MHz to 960 MHz = Paramètres pour les communications d'une interface d'air entre 860 MHz et 960 MHz , 2004 .

[5]  Hung-Min Sun,et al.  A Gen2-Based RFID Authentication Protocol for Security and Privacy , 2009, IEEE Transactions on Mobile Computing.

[6]  Bo Sheng,et al.  Secure and Serverless RFID Authentication and Search Protocols , 2008, IEEE Transactions on Wireless Communications.

[7]  Zhuzhong Qian,et al.  ACSP: A Novel Security Protocol against Counting Attack for UHF RFID Systems , 2011, IMIS.

[8]  Masoumeh Safkhani,et al.  On the Security of Tan et al. Serverless RFID Authentication and Search Protocols , 2012, RFIDSec.

[9]  Andrey Bogdanov,et al.  PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.

[10]  Hung-Yu Chien,et al.  SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity , 2007, IEEE Transactions on Dependable and Secure Computing.

[11]  Masoumeh Safkhani,et al.  Weaknesses in a new ultralightweight RFID authentication protocol with permutation - RAPP , 2014, Secur. Commun. Networks.

[12]  Maode Ma,et al.  A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems , 2013, Wirel. Pers. Commun..

[13]  Yun Tian,et al.  A New Ultralightweight RFID Authentication Protocol with Permutation , 2012, IEEE Communications Letters.