RFID authentication protocol for low-cost RFID tags

Boojoong Kang, Hye Seon Kim, Eui Hyung Kim, Hyong Shik Kim, Eul Gyu Im

Research output: Contribution to journalArticle

7 Scopus citations


Radio Frequency Identification (RFID) is envisioned to replace the optical barcode technology. Many applications have already adopted RFID technology, but RFID systems still have threats to security and privacy of individuals and organizations. To counter with such threats, a variety of security schemes were proposed and some of recent schemes utilize CRC (Cyclic Redundancy Check) conforming to EPC (Electronic Product Code) Class 1 Generation 2 Standards. However, since it is proved that CRC has some weaknesses, these schemes are partly or entirely insecure. In this paper, we propose a new CRC operation and a new authentication scheme using the new CRC operation. We show that our new CRC operation overcomes the weaknesses of the original CRC operation and we also show that our scheme is secure by security analysis.

Original languageEnglish
Pages (from-to)2041-2060
Number of pages20
Issue number6
Publication statusPublished - 2011 Jun 1



  • CRC
  • Mutual authentication
  • RFID
  • Security

Cite this

Kang, B., Kim, H. S., Kim, E. H., Kim, H. S., & Im, E. G. (2011). RFID authentication protocol for low-cost RFID tags. Information, 14(6), 2041-2060.