首页> 外文期刊>Journal of Computational and Applied Mathematics >Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol
【24h】

Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol

机译:Cho等人的密码分析。协议:基于哈希的RFID标签相互认证协议

获取原文
获取原文并翻译 | 示例
       

摘要

Radio frequency identification systems need secure protocols to provide confidentiality, privacy protection, mutual authentication, etc. These protocols should resist active and passive attacks such as forgery, traceability, replay and de-synchronization attacks. Cho et al. recently proposed a hash-based mutual authentication protocol (Cho et al., 2012) and claimed that their scheme addresses all privacy (Juels, 2006) and forgery concerns (Dimitriou, 2005; Yang et al., 2005) linked to RFID technology. However, we show in the following that the protocol fails to bear out many of the authors' security claims, which renders the protocol useless. More precisely, we present the following attacks on this protocol: 1. De-synchronization attack: the success probability of the attack is 1 while the attack complexity is one run of the protocol. 2. Tag impersonation attack: the success probability of the attack is 1/4 for two runs of the protocol. 3. Reader impersonation attack: the success probability of the attack is 1/8 for two runs of the protocol. We also show an additional and more general attack, which is still possible when the conditions needed for the ones above do not hold, and that highlights the poor design of the group ID (RID_i~t). Additionally we show how all the above mentioned attacks are applicable against another protocol, highly reminiscent of that of Cho et al. (2012) and designed in Cho et al. (2011), and also against an enhanced version of the Cho et al. protocol proposed by Kim (2012). Finally we end up by showing how slight modifications in the original protocol can prevent the aforementioned security faults.
机译:射频识别系统需要安全的协议来提供机密性,隐私保护,相互身份验证等。这些协议应抵抗主动和被动攻击,例如伪造,可追溯性,重播和去同步攻击。 Cho等。最近,他提出了一种基于散列的相互认证协议(Cho等,2012),并声称他们的方案解决了与RFID技术相关的所有隐私(Juels,2006)和伪造问题(Dimitriou,2005; Yang等,2005)。但是,我们在下面显示该协议不能支持许多作者的安全声明,这使该协议无用。更准确地说,我们针对该协议提出以下攻击:1.异步攻击:攻击的成功概率为1,而攻击复杂度是该协议的一次运行。 2.标签模拟攻击:两次运行协议,攻击的成功概率为1/4。 3.冒充读者模仿攻击:两次运行协议,攻击的成功概率为1/8。我们还显示了另一种更一般的攻击,当上述条件所必需的条件不成立时,仍然可能发生这种攻击,这凸显了组ID(RID_i〜t)的不良设计。此外,我们展示了上述所有攻击如何适用于另一种协议,这与Cho等人的协议非常相似。 (2012年),并由Cho等人设计。 (2011年),也反对Cho等人的增强版本。 Kim(2012)提出的协议。最后,我们通过展示对原始协议的微小修改如何防止上述安全性错误来结束。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号