首页> 外文会议>International Conference on Information Security and Cryptology >Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol
【24h】

Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol

机译:安全RFID超高级认证协议的准线性密码分析

获取原文

摘要

In 2010, Yeh, Lo and Winata [1] proposed a process-oriented ultralightweight RFID authentication protocol. This protocol is claimed to provide strong security and robust privacy protection, while at the same time the usage of resources on tags is optimized. Nevertheless, in this paper we show how the protocol does not achieve any of its intended security objectives; the main result is that the most valuable information stored on the tag, that is, the static identifier ID, is easily recovered even by a completely passive attacker in a number of ways. More precisely, we start by presenting a traceability attack on the protocol that allows tags to be traced. This essentially exploits the fact that the protocol messages leak out at least one bit of the static identifier. We then present a passive attack (named Norwegian attack) that discloses [log_2 L] bits of the ID, after observing roughly O(L) authentication sessions. Although this attack may seem less feasible in retrieving the full 96-bits of the ID due to the large number of eavesdropped sessions involved, it is already powerful enough to serve as a basis for a very effective traceability attack. Finally, our last attack represents a step forward in the use of a recent cryptanalysis technique (called Tango attack [2]), which allows for an extremely efficient full disclosure attack, capable of revealing the value of the whole ID after eavesdropping only a very small number of sessions.
机译:2010年,YEH,LO和Winata [1]提出了一种以过程为导向的UltraLightWeight RFID认证协议。据称,该协议提供了强大的安全性和强大的隐私保护,而在同一时间同时优化了标签上的资源。尽管如此,在本文中,我们展示了协议如何达到其预期安全目标的任何内容;主要结果是存储在标签上的最有价值的信息,即静态标识符ID,甚至可以通过多种方式通过完全被动攻击者轻松恢复。更确切地说,我们首先呈现关于允许标签要跟踪的协议的可追溯性攻击。这基本上利用了协议消息泄漏了静态标识符的至少一位的事实。然后,我们在观察大致O(l)认证会话之后,展示了披露了ID的[log_2 l]位的被动攻击(命名挪威攻击)。虽然由于涉及的大量窃听会话,这种攻击可能似乎不太可行,但它已经强大,它已经足够强大,以作为非常有效的可追溯性攻击的基础。最后,我们的最后一次攻击代表了使用最近的密码分析技术(称为探戈攻击[2])的前进,这允许极其有效的全披露攻击,能够在窃听窃听之后揭示整个ID的价值少数会话。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号