Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
428977 | Information Processing Letters | 2013 | 5 Pages |
RAPP (RFID Authentication Protocol with Permutation) is a recently proposed and efficient ultralightweight authentication protocol. Although it maintains the structure of the other existing ultralightweight protocols, the operation used in it is totally different due to the use of new introduced data dependent permutations and avoidance of modular arithmetic operations and biased logical operations such as AND and OR.The designers of RAPP claimed that this protocol resists against desynchronization attacks since the last messages of the protocol is sent by the reader and not by the tag. This letter challenges this assumption and shows that RAPP is vulnerable against desynchronization attack. This attack has a reasonable probability of success and is effective whether Hamming weight-based or modular-based rotations are used by the protocol.
► The security of RAPP, a new proposed ultralightweight authentication protocol, is analyzed. ► We challenged the RAPP designersʼ claim about the protocol resistance against desynchronization attack. ► The presented desynchronization attack is effective whether Hamming weight-based or modular-based rotations is used by the protocol. ► The attack has a remarkable success probability of about 1/4.