The server searches its database using M1, M2 and r1 as follows. i. It chooses t i from amongst the values t i ( new ) or t i ( old ) stored in the database, ii. It computes M'2 =f ti (r1 (M1 ? t i )) ,
Security and privacy in Radio Frequency Identification devices, Massachusetts Institute of Technology, 2003. ,
Cryptography in Radio Frequency Identification and fair exchange protocols, 2005. ,
Practical attacks on a RFID authentication protocol conforming to EPC Class 1 Generation 2 standard. arXiv preprint arXiv:1102, p.763, 2011. ,
RFID authentication protocol for low-cost tags, Proceedings of the first ACM conference on Wireless network security , WiSec '08, pp.140-147, 2008. ,
DOI : 10.1145/1352533.1352556
Attacks and improvements to an RIFD mutual authentication protocol and its extensions, Proceedings of the second ACM conference on Wireless network security, WiSec '09, pp.51-58, 2009. ,
DOI : 10.1145/1514274.1514282
Security analysis of the song-mitchell authentication protocol for low-cost RFID tags, IEEE Communications Letters, vol.13, issue.4, pp.274-276, 2009. ,
DOI : 10.1109/LCOMM.2009.082117
RFID Authentication Protocols using Symmetric Cryptography, 2009. ,
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards, Computer Standards & Interfaces, vol.29, issue.2 ,
DOI : 10.1016/j.csi.2006.04.004