On Ultralightweight RFID Authentication Protocols

被引:71
|
作者
D'Arco, Paolo [1 ]
De Santis, Alfredo [1 ]
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84084 Fisciano 1, SA, Italy
关键词
RFID technology; cryptographic protocols; cryptoanalysis; SASI;
D O I
10.1109/TDSC.2010.75
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A recent research trend, motivated by the massive deployment of RFID technology, looks at cryptographic protocols for securing communication between entities in which some of the parties have very limited computing capabilities. In this paper, we focus our attention on SASI, a new RFID authentication protocol, designed for providing Strong Authentication and Strong Integrity. SASI is a good representative of a family of RFID authentication protocols, referred to as Ultralightweight RFID authentication protocols. These protocols, suitable for passive Tags with limited computational power and storage, involve simple bitwise operations such as and, or, exclusive or, modular addition, and cyclic shift operations. They are efficient, fit the hardware constraints, and can be seen as an example of the above research trend. However, the main concern is the real security of these protocols, which are often supported only by apparently reasonable and intuitive arguments. The contribution we provide with this work is the following: we start by showing some weaknesses in the SASI protocol, and then, we describe how such weaknesses, through a sequence of simple steps, can be used to compute in an efficient way all secret data used for the authentication process. Specifically, we describe three attacks: 1) a desynchronization attack, through which an adversary can break the synchronization between the RFID Reader and the Tag; 2) an identity disclosure attack, through which an adversary can compute the identity of the Tag; and 3) a full disclosure attack, which enables an adversary to retrieve all secret data stored in the Tag. Then, we present some experimental results, obtained by running several tests on an implementation of the protocol, in order to evaluate the performance of the proposed attacks, which confirm that the attacks are effective and efficient. It comes out that an active adversary by interacting with a Tag more or less three hundred times, makes the authentication protocol completely useless. Finally, we close the paper with some observations. The cryptoanalysis of SASI gets some new light on the ultralightweight approach, and can also serve as a warning to researchers working on the field and tempted to apply these techniques. Indeed, the results of this work, rise serious questions regarding the limits of the ultralightweight family of protocols, and on the benefits of these ad hoc protocol design strategies and informal security analysis.
引用
收藏
页码:548 / 563
页数:16
相关论文
共 50 条
  • [31] Efficient Hardware Implementation of Ultralightweight RFID Mutual Authentication Protocol
    Mujahid, Umar
    Jafri, Atif Raza
    Najam-ul-Islam, M.
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2016, 25 (07)
  • [32] Ultralightweight RFID Authentication Protocol Based on Permutation Matrix Encryption
    Hang, Tinghui
    Ding, Yong
    Wang, Zhen
    Wang, Huijiao
    [J]. 2019 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2019, : 417 - 423
  • [33] On the Security of RFID Authentication Protocols
    Desai, Nidhi
    Das, Manik Lal
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2015,
  • [34] RFID mutual authentication protocols
    Piramuthu, Selwyn
    [J]. DECISION SUPPORT SYSTEMS, 2011, 50 (02) : 387 - 393
  • [35] A Survey of RFID Authentication Protocols
    Yousuf, Yawer
    Potdar, Vidyasagar
    [J]. 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1346 - 1350
  • [36] A Coding Theory Based Ultralightweight RFID Authentication Protocol with CRC
    Maurya, Pramod Kumar
    Pal, Joydeb
    Bagchi, Satya
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (01) : 967 - 976
  • [37] A Coding Theory Based Ultralightweight RFID Authentication Protocol with CRC
    Pramod Kumar Maurya
    Joydeb Pal
    Satya Bagchi
    [J]. Wireless Personal Communications, 2017, 97 : 967 - 976
  • [38] Study Of RFID Authentication Protocols
    Jadhao, A. G.
    Ugale, S. P.
    [J]. 2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [39] Weaknesses in a new ultralightweight RFID authentication protocol with permutation-RAPP
    Bagheri, Nasour
    Safkhani, Masoumeh
    Peris-Lopez, Pedro
    Tapiador, Juan E.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (06) : 945 - 949
  • [40] Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol
    Peris-Lopez, Pedro
    Hernandez-Castro, Julio Cesar
    Phan, Raphael C. -W.
    Tapiador, Juan M. E.
    Li, Tieyan
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 427 - +