首页> 外文期刊>IEEE transactions on information forensics and security >Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols
【24h】

Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols

机译:超轻量认证协议的递归线性和差分密码分析

获取原文
获取原文并翻译 | 示例
           

摘要

Privacy is faced with serious challenges in the ubiquitous computing world. In order to handle this problem, some researchers in recent years have focused on design and analysis of privacy-friendly ultralightweight authentication protocols. Although the majority of these schemes have been broken to a greater or lesser extent, most of these attacks are based on ad-hoc methods that are not extensible to a large class of ultralightweight protocols. So this research area still suffers from the lack of structured cryptanalysis and evaluation methods. In this paper, we introduce new frameworks for full disclosure attacks on ultralightweight authentication protocols based on new concepts of recursive linear and recursive differential cryptanalysis. The recursive linear attack is passive, deterministic, and requires only a single authentication session, if it can be applied successfully. The recursive differential attack is more powerful and can be applied to the protocols on which the linear attack may not work. This attack is probabilistic, active in the sense that the attacker suffices only to block some specific messages, and requires a few authentication sessions. Having introduced these frameworks in a general view, we apply them on some well-known ultralightweight protocols. The first attack can retrieve all the secret data of Yeh and SLMAP authentication protocols and the second one can retrieve all the secret data of LMAP++, SASI, and David-Prasad authentication protocols.
机译:在无处不在的计算世界中,隐私面临着严峻的挑战。为了解决这个问题,近年来,一些研究人员集中于设计和分析对隐私友好的超轻量级身份验证协议。尽管这些方案中的大多数已或多或少地受到了破坏,但是这些攻击中的大多数都是基于临时方法,这些方法无法扩展到一大类超轻量级协议。因此,该研究领域仍然缺乏结构化密码分析和评估方法。在本文中,我们基于递归线性和递归差分密码分析的新概念,介绍了针对超轻量认证协议的完全公开攻击的新框架。递归线性攻击是被动的,确定性的,并且如果可以成功应用,则仅需要单个身份验证会话。递归差分攻击功能更强大,可以应用于线性攻击可能无法使用的协议。这种攻击是概率性的,在攻击者仅满足阻止某些特定消息的需要的意义上是活跃的,并且需要一些身份验证会话。在总体上介绍了这些框架之后,我们将它们应用于一些众所周知的超轻量级协议。第一次攻击可以检索Yeh和SLMAP身份验证协议的所有机密数据,第二次攻击可以检索LMAP ++ ,SASI和David-Prasad身份验证协议的所有机密数据。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号