Research Article

A Secure RFID Authentication Protocol Adopting Error Correction Code

Algorithm 2

The proposed protocol with secret key updating.
(1)      :  Compute = + , where
        
        Generate a random challenge
(2)  :   ,
(3)     :  Compute =
        IF satisfies any pattern in
         Generate a random challenge
          = + , where
         
        ELSE
         Set = random value
         Set = random value
(4)    : 
(5)       : Compute
        Decode
         IF   can be decoded
        Verify by using
         IF is correct
        
        
         ELSE
         Verify by using
          IF is correct
          
          
         ELSE
         Set = random value and ignore
(6)  : 
(7)     : Verify to authenticate