@inproceedings{d602aa2f8474426ca0ac37addb2878c0,
title = "EC-RAC: Enriching a Capacious RFID Attack Collection",
abstract = "We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first class of attacks concerns the compositional approach used to construct a particular revision of EC-RAC. We invalidate the authentication and privacy claims made for that revision. We discuss the significance of the fact that RFID privacy is not compositional in general. Our second class of attacks applies to all versions of EC-RAC and reveals hitherto unknown vulnerabilities in the latest version of EC-RAC. It is a general man-in-the-middle attack executable by a weak adversary. We show a general construction for improving narrow-weak private protocols to wide-weak private protocols and indicate specific improvements for the flaws of EC-RAC exhibited in this document.",
keywords = "Attacks, Authentication, Compositionality, Privacy, RFID",
author = "{van Deursen}, Ton and Sa{\v s}a Radomirovi{\'c}",
note = "Ton van Deursen was supported by a grant from the Fonds National de la Recherche (Luxembourg); 6th International Workshop on Radio Frequency Identification: Security and Privacy Issues , RFIDSec 2010 ; Conference date: 08-06-2010 Through 09-06-2010",
year = "2010",
doi = "10.1007/978-3-642-16822-2_8",
language = "English",
isbn = "9783642168215",
series = "Lecture Notes in Computer Science ",
publisher = "Springer Verlag",
pages = "75--90",
editor = "Berna, {Siddika } and Yalcin, {Ors }",
booktitle = "Radio Frequency Identification",
address = "Germany",
}