Research Article
A Secure RFID Authentication Protocol Adopting Error Correction Code
Algorithm 2
The proposed protocol with secret key updating.
(1) : Compute = + , where | | Generate a random challenge | (2) : , | (3) : Compute = | IF satisfies any pattern in | Generate a random challenge | = + , where | | ELSE | Set = random value | Set = random value | (4) : | (5) : Compute | Decode | IF can be decoded | Verify by using | IF is correct | | | ELSE | Verify by using | IF is correct | | | ELSE | Set = random value and ignore | (6) : | (7) : Verify to authenticate |
|