Mutual Authentication
SecuritySecurity protocol where both the RFID reader and tag verify each other's identity using cryptographic challenge-response.
Mutual Authentication in RFID
RFID identity verification." data-category="Security">Mutual authentication is a security protocol where both the RFID reader and the tag independently verify each other's identity using cryptographic challenge-response exchanges. In a mutual authentication scheme, the reader proves it is authorised to access the tag, and the tag proves it is genuine — not a clone or counterfeit. This bidirectional verification is the gold standard for RFID security, defined in the EPC Gen2 version 2 specification and implemented using crypto suite algorithms.
Authentication Flow
A typical mutual authentication session involves six steps:
- Reader challenges tag: The reader generates a random nonce (R_n) and sends it to the tag via the Authenticate command.
- Tag responds: The tag encrypts R_n using its on-chip secret key and the agreed crypto suite algorithm (e.g., AES-128). It also generates its own nonce (T_n) and includes it in the response.
- Reader verifies tag: The reader (or its backend key server) decrypts the tag's response. If the decrypted value matches R_n, the tag is authenticated — it possesses the correct secret key.
- Reader responds to tag challenge: The reader encrypts T_n with the shared key and sends the result back to the tag.
- Tag verifies reader: The tag decrypts the reader's response. If it matches T_n, the reader is authenticated.
- Secure session established: Both parties have verified each other. Subsequent commands (Read, Write) can be encrypted using a session key derived from the authentication exchange.
Why Mutual Authentication Matters
Prevents cloning: A cloned tag has a copied EPC but lacks the secret key embedded in the authentic tag's tag IC silicon. It will fail the authentication challenge.
Prevents rogue readers: Without mutual authentication, any reader can interrogate any tag. A rogue reader could extract sensitive data from tags (product information, patient records, access credentials). Mutual authentication ensures the tag only responds to authorised readers.
Defeats replay attacks: Because each authentication session uses fresh random nonces, captured authentication transcripts are useless for future sessions.
Implementation Requirements
Mutual authentication requires tag ICs with built-in cryptographic engines — significantly more complex (and more expensive) than basic EPC-only chips. ICs supporting mutual authentication include NXP UCODE DNA (AES-128), and select Impinj chips with authentication extensions.
The reader side requires a key management infrastructure. Each tag's secret key must be provisioned during manufacturing and securely stored in a key server. The reader queries the key server during authentication, or carries a local key cache for offline operation.
Deployment Scenarios
Pharmaceutical anti-counterfeiting: Hospital pharmacies verify drug authenticity by performing mutual authentication at the point of dispensing. The verification result is logged as an EPCIS event.
Luxury brand protection: High-value goods (watches, handbags, spirits) carry authentication-capable tags. Consumers can verify authenticity via NFC-enabled smartphones, and the brand's backend confirms the tag is genuine.
Aviation parts verification: Before installing a tagged aircraft component, maintenance crews authenticate the tag to confirm the part is a genuine OEM unit, not a counterfeit with a cloned EPC.
Related Content
NXP UCODE Family Guide
Tag Selection…the only commercially available tag IC with full AES-128 mutual authentication certified for RAIN RFID — and on untraceable mode, which…
EM Microelectronic RFID ICs
Tag Selection…KB High-speed ISO 15693, AFI/DSFID EM4750A 2 KB + AES-128 mutual authentication The EM4750A is notable for adding AES-128 mutual…
Edge Computing for RFID
Integration…and gateway-to-cloud communication - Certificate-based mutual authentication between readers and gateway ( LLRP over TLS) - Physical…
Crypto-Enabled RFID Tags Guide
Security & Privacy…tags add a cryptographic engine to the tag IC, enabling mutual authentication, rolling codes, and protected memory. They are the…
RFID Privacy and Consumer Protection
Security & Privacy…command. Only a reader that completes a successful mutual authentication exchange gains access. Protected mode is stronger than…
EPC Gen2v2 Deep Dive
Advanced Topics…Area Gen 2 v1.2 Gen 2v2 Authentication None AES-128 mutual authentication (Crypto Suite 2) Privacy EPC always readable in Inventory…
Часто задаваемые вопросы
The RFID glossary is a comprehensive reference of technical terms, acronyms, and concepts used in Radio-Frequency Identification technology. It is designed for engineers, system integrators, and project managers who work with RFID and need clear definitions of terms like EPC, backscatter, anti-collision, and ISO 18000.
Yes. RFIDFYI provides glossary definitions in 15 languages including English, Korean, Japanese, Chinese, Spanish, Portuguese, Hindi, Arabic, French, Russian, German, Turkish, Vietnamese, Indonesian, and Thai.