...
首页> 外文期刊>Computer standards & interfaces >Cryptanalysis Of A Novel Authentication Protocol Conforming To Epc-c1g2 Standard
【24h】

Cryptanalysis Of A Novel Authentication Protocol Conforming To Epc-c1g2 Standard

机译:符合Epc-c1g2标准的新型身份验证协议的密码分析

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

In 2006, the standard EPC Class-1 Generation-2 (EPC-C1G2) was ratified both by EPCglobal and ISO. This standard can be considered as a "universal" specification for low-cost RFID tags. Although it represents a great advance for the consolidation of RFID technology, it does not pay due attention to security and, as expected, its security level is very low. In 2007, Chien et al. published a mutual authentication protocol conforming to EPC-C1G2 which tried to correct all its security shortcomings. In this article, we point out various major security flaws in Chien et al.'s proposal. We show that none of the authentication protocol objectives are met. Unequivocal identification of tagged items is not guaranteed because of possible birthday attacks. Furthermore, an attacker can impersonate not only legitimate tags, but also the back-end database. The protocol does not provide forward security either. Location privacy is easily jeopardized by a straightforward tracking attack. Finally, we show how a successful auto-desynchronization (DoS attack) can be accomplished in the back-end database despite the security measures taken against it.
机译:2006年,EPCglobal和ISO都批准了标准的EPC Class-1第二代(EPC-C1G2)。该标准可以被视为低成本RFID标签的“通用”规范。尽管它代表了整合RFID技术的巨大进步,但它并未对安全性给予应有的重视,并且正如预期的那样,其安全级别非常低。 2007年,Chien等人。发布了符合EPC-C1G2的相互认证协议,该协议试图纠正其所有安全缺陷。在本文中,我们指出了Chien等人的建议中的各种主要安全漏洞。我们显示没有一个身份验证协议目标得到满足。由于可能发生生日袭击,因此不能保证明确标识带标签的物品。此外,攻击者不仅可以模拟合法标签,还可以模拟后端数据库。该协议也不提供前向安全性。直接的跟踪攻击很容易损害位置隐私。最后,我们展示了尽管采取了安全措施,但如何在后端数据库中成功完成自动去同步(DoS攻击)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号