This enables the adversary to trace the tag.
This attack can be accomplished as follows. Assume that an
adversary observes a full authentication session of a tag. The
adversary listening the communication between the reader and
the tag obtains the following session messages: