Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol

被引:0
|
作者
Peris-Lopez, Pedro [1 ]
Hernandez-Castro, Julio Cesar [2 ]
Phan, Raphael C. -W.
Tapiador, Juan M. E. [3 ,4 ]
Li, Tieyan [5 ]
机构
[1] Delft Univ Technol, Fac EEMCS, Secur & Privacy Lab, NL-2600 AA Delft, Netherlands
[2] Univ Portsmouth, Sch Comp, Portsmouth PO1 2UP, Hants, England
[3] Univ Louisville, Dept Elect Elect Engn, Louisville, KY 40292 USA
[4] NYU, Dept Comp Sci, New York, NY 10003 USA
[5] ASTAR Singapore, Inst Infocomm Res, New York, NY 10003 USA
来源
关键词
RFID; Cryptanalysis; Ultralightweight; Authentication; TAGS; SASI;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In 2010, Yeh, Lo and Winata [1] proposed a process-oriented ultralightweight RFID authentication protocol. This protocol is claimed to provide strong security and robust privacy protection, while at the same time the usage of resources on tags is optimized. Nevertheless, in this paper we show how the protocol does not achieve any of its intended security objectives; the main result is that the most valuable information stored on the tag, that is, the static identifier ID, is easily recovered even by a completely passive attacker in a number of ways. More precisely, we start by presenting a traceability attack on the protocol that allows tags to be traced. This essentially exploits the fact that the protocol messages leak out at least one bit of the static identifier. We then present a passive attack (named Norwegian attack) that discloses [log(2) L.] bits of the ID, after observing roughly O(L) authentication sessions. Although this attack may seem less feasible in retrieving the full 96-bits of the ID due to the large number of eavesdropped sessions involved, it is already powerful enough to serve as a basis for a very effective traceability attack. Finally, our last attack represents a step forward in the use of a recent cryptanalysis technique (called Tango attack [2]), which allows for an extremely efficient full disclosure attack, capable of revealing the value of the whole ID after eavesdropping only a very small number of sessions.
引用
收藏
页码:427 / +
页数:4
相关论文
共 50 条
  • [1] Cryptanalysis of a New Ultralightweight RFID Authentication Protocol-SASI
    Phan, Raphael C. -W.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (04) : 316 - 320
  • [2] Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol
    Hernandez-Castro, Julio Cesar
    Peris-Lopez, Pedro
    Phan, Raphael C. -W.
    Tapiador, Juan M. E.
    [J]. RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 22 - +
  • [3] An Effective Ultralightweight RFID Secure Protocol with Mutual Authentication
    Jia, Qingxuan
    Wang, Xin
    Gao, Xin
    Gao, Panpan
    Zhao, Bing
    [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING, PTS 1-3, 2013, 278-280 : 1966 - +
  • [4] An Enhanced Ultralightweight RFID Authentication Protocol
    Yeh, Tzu-Chang
    Wu, Chia-Sheng
    [J]. JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 799 - 804
  • [5] Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems
    Abyaneh, Mohammad Reza Sohizadeh
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 92 - 103
  • [6] An ultralightweight RFID authentication protocol with CRC and permutation
    Gao, Lijun
    Ma, Maode
    Shu, Yantai
    Wei, Yuhua
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 41 : 37 - 46
  • [7] A New Ultralightweight RFID Authentication Protocol with Permutation
    Tian, Yun
    Chen, Gongliang
    Li, Jianhua
    [J]. IEEE COMMUNICATIONS LETTERS, 2012, 16 (05) : 702 - 705
  • [8] A New Ultralightweight RFID Protocol with Mutual Authentication
    Lee, Y. -C.
    Hsieh, Y. -C.
    You, P. -S.
    Chen, T. -C.
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 58 - +
  • [9] Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols
    Ahmadian, Zahra
    Salmasizadeh, Mahmoud
    Aref, Mohammad Reza
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (07) : 1140 - 1151
  • [10] Cryptanalysis of the LCSS RFID Authentication Protocol
    Cao, Tianjie
    Shen, Peng
    Bertino, Elisa
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 305 - +