On the Improper Use of CRC for Cryptographic Purposes in RFID Mutual Authentication Protocols

Eyad S. Taqieddin(1*)
(1) Jordan University of Science and Technology
(*) Corresponding Author
DOI : 10.54039/ijcnis.v9i2.2376


Mutual authentication is essential to guarantee the confidentiality, integrity, and availability of an RFID system. One area of interest is the design of lightweight mutual authentication protocols that meet the limited computational and energy resources of the tags. These protocols use simple operations such as permutation and cyclic redundancy code for cryptographic purposes. However, these functions are cryptographically weak and are easily broken. In this work, we present a case against the use of these functions for cryptographic purposes, due to their simplicity and linear properties, by analyzing the LPCP protocol. We evaluate the claims of the LPCP resistance to de-synchronization and full disclosure attacks and show that the protocol is weak and can be easily broken by eavesdropping on a few mutual authentication sessions. This  weakness stems from the functions themselves as well as the improper use of inputs to these functions. We further offer suggestions that would help in designing more secure protocols.

Article Statistic

Abstract view : 26 times
PDF views : 9 times

How To Cite This :


  • There are currently no refbacks.

International Journal of Communication Networks and Information Security (IJCNIS)               ISSN: 2073-607X (Online)