Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol
Publish place: Journal of Computing and Security، Vol: 6، Issue: 1
Publish Year: 1398
Type: Journal paper
Language: English
View: 331
This Paper With 11 Page And PDF Format Ready To Download
- Certificate
- I'm the author of the paper
Export:
Document National Code:
JR_JCSE-6-1_003
Index date: 6 February 2021
Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol abstract
Security analysis of a protocol is an important step toward the public trust on its security. Recently, in 2018, Moradi et al. considered the security of the Wei and Zhang RFID EPC-C1 G2 compliant authentication protocol and presented desynchronization attack and also server/reader impersonation attack against it. Then they proposed an improved version of the protocol. However, in this paper as the first third-party analysis of this protocol to the best of our knowledge, we present an efficient secret disclosure attack with the complexity of only two runs of protocol and doing O(2^{16}) PRNG offline evaluations. We also recommend that designing a secure protocol by using 16-bit CRCs and 16-bit PRNGs in the framework of EPC-C1 G2 may not be possible and changing this standard to allow the use of lightweight cryptographic functions should be inevitable. In this line, we present an improved version of the Moradi et al.protocol and also prove its security both informally and formally, through GNY logic.
Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol Keywords:
Full Secret Disclosure Attack against an EPC- C1 G2 Compliant Authentication Protocol authors
Masoumeh Safkhani
Shahid Rajaee Teacher Training University
مراجع و منابع این Paper:
لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :