Document Type : Original Research Paper


Computer Engineering Department, Shahid Rajaee Teacher Training University, Tehran, Iran.


Background and Objectives: To overcome the security flaw of RAPP authentication protocol, Zhuang et al. proposed a novel ultralightweight RFID mutual authentication protocol, called R2AP. In this paper, we first propose a new desynchronization attack against this protocol.
Methods: To extract the secret ID, linear cryptanalysis is used, which is a tool mostly for attack block ciphers.
Results: Our proposed desynchronization attack succeeds with the probability almost 1 and requires an adversary to initiate 1829 sessions of the protocol with the tag. On the other hand, the protocol updates the tag and the reader secretes to provide the tag holder privacy. However, it is shown that a passive adversary who eavesdrops only two sessions of the protocol can trace the tag with the probability of 0.921. In addition, passive attack for which the adversary can extract the secret ID of the tag is presented assuming that the adversary eavesdropped 128 sessions of the protocol, its success probability would be 0.387.
Conclusion: It was shown that R2AP suffers from desynchronization, traceability, and disclosure attacks, where the two later attacks work in passive adversary model.

©2018 The author(s). This is an open access article distributed under the terms of the Creative Commons Attribution (CC BY 4.0), which permits unrestricted use, distribution, and reproduction in any medium, as long as the original authors and source are cited. No permission is required from the authors or the publishers.


Main Subjects


Journal of Electrical and Computer Engineering Innovations (JECEI) welcomes letters to the editor for the post-publication discussions and corrections which allows debate post publication on its site, through the Letters to Editor. Letters pertaining to manuscript published in JECEI should be sent to the editorial office of JECEI within three months of either online publication or before printed publication, except for critiques of original research. Following points are to be considering before sending the letters (comments) to the editor.

[1] Letters that include statements of statistics, facts, research, or theories should include appropriate references, although more than three are discouraged.

[2] Letters that are personal attacks on an author rather than thoughtful criticism of the author’s ideas will not be considered for publication.

[3] Letters can be no more than 300 words in length.

[4] Letter writers should include a statement at the beginning of the letter stating that it is being submitted either for publication or not.

[5] Anonymous letters will not be considered.

[6] Letter writers must include their city and state of residence or work.

[7] Letters will be edited for clarity and length.