Wireless Personal Communications DOI: 10.1007/•••••-•••-•••-••••- Security of an RFID based Authentication Protocol with Bitwise Operations for Supply Chain Muhammad Arslan Akram 1 · Adnan Noor Mian 1 © Springer •••• Abstract Due to the stringent computational capabilities of low-cost RFID tags, several lightweight secure authentication protocols have been proposed for an RFID-based supply chain using bitwise operations. In this paper, we study the vulnerabilities associated with bitwise operations by doing cryptanalysis of a secure lightweight authentication protocol for RFID tags. The bitwise operations like rotation and XOR show that the protocol is vulnerable to tag, reader, and supply chain node impersonation attacks. We find that the major cause of the vulnerability is bitwise operations and suggest using the physically unclonable functions rather than bitwise operations to secure such lightweight protocols. Keywords: Authentication protocol, PUF, Cryptanalysis, RFID, Imperson- ation Attack, Supply Chain 1. Introduction Supply chain is the management of the entire flow of goods, data, finance and production, and supervises the processes until it transforms them into final products or reaches their destination. A well-managed and immutable supply chain is needed to identify the origin of counterfeit goods which have somehow reached to the consumers Dabbene, Gay, and Tortia (2014). In supply chain many departments link with each other by using RFID tags for the acquisition of their own data. Recently, several lightweight authentication protocols have been proposed with the goal of achieving secure authentication through bitwise operations A.N.M. adnan.noor@itu.edu.pk M.A.A. arslan.akram@itu.edu.pk 1 Department of Computer Science, Information Technology University, Lahore, Punjab, Pakistan. WPC: output.tex; 11 April 2021; 6:56; p. 1