The distance-bounding protocol based on Russian cryptographic algorithms

被引:0
|
作者
Belsky, Vladimir [1 ]
Chichaeva, Anastasiia [1 ]
Shishkin, Vasily [1 ]
Tsaregorodtsev, Kirill [1 ]
机构
[1] JSRPC Kryptonite, Cryptog Lab, Moscow 115114, Russia
关键词
Distance-bounding; RFID; Authentication;
D O I
10.1007/s11416-024-00524-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In distance-bounding authentication protocols the Prover has to prove not only that it is a legitimate participant, but also that it is in a legitimate zone (e.g., in close proximity to the Verifier). Conventional authentication protocols are not designed to deal with the location of protocol parties. Using such protocols in case of RFID systems makes them vulnerable to simple relay attacks, which is a significant threat. Protocols that combine cryptographic mechanisms with technical measurements (e.g., time-of-flight or GPS location of the Prover) are often used to protect against relay attacks. In this paper we analyse existing distance-bounding authentication protocols and propose a new DB-RFID\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathsf {DB \text {-} RFID}$$\end{document} distance-bounding protocol for RFID systems. DB-RFID\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathsf {DB \text {-} RFID}$$\end{document} protocol develops the ideas of the most prominent Swiss-Knife protocol, which protects against a greater number of possible attacks. We also provide an initial security analysis of the protocol and propose a version of the protocol based on Russian standardized cryptographic algorithms.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] The Poulidor Distance-Bounding Protocol
    Trujillo-Rasua, Rolando
    Martin, Benjamin
    Avoine, Gildas
    [J]. RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 239 - +
  • [2] Yet another secure distance-bounding protocol
    Nikov, Ventzislav
    Vauclair, Marc
    [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 218 - 221
  • [3] A Secure Distance-Bounding Protocol with Mutual Authentication
    Liu, Weiwei
    Guo, Hua
    Tian, Yangguang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [4] A Note on a Privacy-Preserving Distance-Bounding Protocol
    Aumasson, Jean-Philippe
    Mitrokotsa, Aikaterini
    Pens-Lopez, Pedro
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 78 - 92
  • [5] Distance-bounding Identification
    Ahmadi, Ahmad
    Safavi-Naini, Reihaneh
    [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 202 - 212
  • [6] Mafia Fraud Attack against the RC Distance-Bounding Protocol
    Mitrokotsa, Aikaterini
    Onete, Cristina
    Vaudenay, Serge
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2012,
  • [7] Distance-bounding protocol with time-stamped authentication for RFID
    Wei Guo-heng
    Zhang Huan-guo
    Li Zheng
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 139 - 145
  • [8] Directional Distance-Bounding Identification
    Ahmadi, Ahmad
    Safavi-Naini, Reihaneh
    [J]. INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 197 - 221
  • [9] Practical and provably secure distance-bounding
    Boureanu, Ioana
    Mitrokotsa, Aikaterini
    Vaudenay, Serge
    [J]. JOURNAL OF COMPUTER SECURITY, 2015, 23 (02) : 229 - 257
  • [10] Security of Distance-Bounding: A Survey
    Avoine, Gildas
    Bingol, Muhammed Ali
    Boureanu, Ioana
    Capkun, Srdjan
    Hancke, Gerhard
    Kardas, Suleyman
    Kim, Chong Hee
    Lauradoux, Cedric
    Martin, Benjamin
    Munilla, Jorge
    Peinado, Alberto
    Rasmussen, Kasper Bonne
    Singelee, Dave
    Tchamkerten, Aslan
    Trujillo-Rasua, Rolando
    Vaudenay, Serge
    [J]. ACM COMPUTING SURVEYS, 2019, 51 (05)