Algebraic Attacks on RFID Protocols

被引:0
|
作者
van Deursen, Ton [1 ]
Radomirovic, Sasa [1 ]
机构
[1] Univ Luxembourg, Luxembourg, Luxembourg
关键词
Formal verification; algebraic methods; RFID; security protocols; attacks; MUTUAL-AUTHENTICATION PROTOCOL; SECURITY; PRIVACY; EFFICIENT;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This work aims to identify the algebraic problems which enable many attacks on RFID protocols. Toward this goal, three emerging types of attacks on RFID protocols, concerning authentication, untraceability, and secrecy are discussed. We demonstrate the types of attacks by exhibiting previously unpublished vulnerabilities in several protocols and referring to various other flawed protocols. The common theme in these attacks is the fact that the algebraic properties of operators employed by the protocols are abused. While the methodology is applicable to any operator with algebraic properties, the protocols considered in this paper make rise of xor, modular addition, and elliptic curve point addition.
引用
收藏
页码:38 / 51
页数:14
相关论文
共 50 条
  • [1] Algebraic Replay Attacks on Authentication in RFID Protocols
    Chikouche, Noureddine
    Cherif, Foudil
    Benmohammed, Mohamed
    [J]. ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 153 - +
  • [2] Attacks on Recent RFID Authentication Protocols
    Mohammad Hassan Habibi
    Mohammad Reza Aref
    [J]. Journal of Signal Processing Systems, 2015, 79 : 271 - 283
  • [3] Attacks on Recent RFID Authentication Protocols
    Habibi, Mohammad Hassan
    Aref, Mohammad Reza
    [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2015, 79 (03): : 271 - 283
  • [4] Attacks on and Countermeasures for Two RFID Protocols
    Chen, Xiuqing
    Cao, Tianjie
    Doss, Robin
    Zhai, Jingxuan
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5825 - 5848
  • [5] Attacks on and Countermeasures for Two RFID Protocols
    Xiuqing Chen
    Tianjie Cao
    Robin Doss
    Jingxuan Zhai
    [J]. Wireless Personal Communications, 2017, 96 : 5825 - 5848
  • [6] Attacks on CKK family of RFID authentication protocols
    Golebiewski, Zbigniew
    Majcher, Krzysztof
    Zagorski, Filip
    [J]. AD-HOC, MOBILE AND WIRELESS NETWORKS, PROCEEDINGS, 2008, 5198 : 241 - +
  • [7] Data desynchronization attacks on RFID security protocols
    Cao, Zheng
    Ma, Jianfeng
    Yang, Lin
    Deng, Miaolei
    [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2013, 41 (04): : 65 - 69
  • [8] Passive attacks on a class of authentication protocols for RFID
    Alomair, Basel
    Lazos, Loukas
    Poovendran, Radha
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 102 - 115
  • [9] Defending RFID authentication protocols against DoS attacks
    Dang Nguyen Duc
    Kim, Kwangjo
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 384 - 390
  • [10] Grobner Basis Attacks on Lightweight RFID Authentication Protocols
    Han, Daewan
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2011, 7 (04): : 691 - 706