Full Secret Disclosure Attack against an EPC- C۱ G۲ Compliant Authentication Protocol

Publish Year: 1398
نوع سند: مقاله ژورنالی
زبان: English
View: 273

This Paper With 11 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JCSE-6-1_003

تاریخ نمایه سازی: 19 بهمن 1399

Abstract:

Security analysis of a protocol is an important step toward the public trust on its security. Recently, in ۲۰۱۸, Moradi et al. considered the security of the Wei and Zhang RFID EPC-C۱ G۲ compliant authentication protocol and presented desynchronization attack and also server/reader impersonation attack against it. Then they proposed an improved version of the protocol. However, in this paper as the first third-party analysis of this protocol to the best of our knowledge, we present an efficient secret disclosure attack with the complexity of only two runs of protocol and doing O(۲^{۱۶}) PRNG offline evaluations. We also recommend that designing a secure protocol by using ۱۶-bit CRCs and ۱۶-bit PRNGs in the framework of EPC-C۱ G۲ may not be possible and changing this standard to allow the use of lightweight cryptographic functions should be inevitable. In this line, we present an improved version of the Moradi et al.protocol and also prove its security both informally and formally, through GNY logic.

Authors

Masoumeh Safkhani

Shahid Rajaee Teacher Training University

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • S. F. Aghili, M. Ashouri-Talouki, and H. Mala. DoS, impersonation and de-synchronization attacks ...
  • S. F. Aghilia, H. Mala, P. Kaliyar, and M. Conti. SecLAP: Secure and lightweight ...
  • Z. Ahmadian, M. Salmasizadeh, and M. R. Aref. Recursive Linear and Differential Cryptanalysis ...
  • A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P. C. Heám, ...
  • P. Arulmozhi, J. B. B. Rayappan, and Pethuru Raj. A Lightweight Memory-Based Protocol ...
  • G. Avoine and X. Carpent. Yet Another Ultralightweight Authentication Protocol that is ...
  • G. Avoine, X. Carpent, and B. Martin. Privacy-friendly synchronized ultralightweight authentication protocols in ...
  • N. Bagheri, M. Safkhani, P. Peris‐Lopez, and Juan E. Tapiador. Weaknesses in a new ...
  • R. Beaulieu, S. Treatman-Clark, D. Shors, B. Weeks, J. Smith, and L. Wingers. The SIMON and ...
  • C. Beierle, J. Jean, S. Kölbl, G. Leander, A. Moradi, T. Peyrin, Y. Sasaki, P. Sasdrich, and S. M. ...
  • Y. Bendavid, N. Bagheri, M. Safkhani, and S. Rostampour. IoT Device Security: Challenging “A ...
  • B. Blanchet and A. Chaudhuri. Automated formal analysis of a protocol for ...
  • M. Burrows, M. Abadi, and R. Needham. BAN a logic of authentication. Technical ...
  • Cas J. F. Cremers. The Scyther Tool: Verification, falsification, and analysis ...
  • P. D'Arco and A. D. Santis. On ultralightweight RFID authentication protocols. IEEE ...
  • A. Falahati, H. Azizi, and R. M. Edwards. RFID light weight server-less search ...
  • A. Falahati and H. Jannati. All-or-nothing approach to protect a distance bounding ...
  • K. Fan, W. Jiang, H. Li, and Y. Yang. Lightweight RFID protocol for medical ...
  • L. Gong, R. Needham, and R. Yahalom. Reasoning about belief in cryptographic protocols. ...
  • P. Huang, H. Mu, and C. Zhang. A New Lightweight RFID Grouping Proof ...
  • P. Huang, H. Mu, and C. Zhang. Cryptanalysis and enhancement of a secure ...
  • Hoda Jannati. Cryptanalysis and enhancement of two low cost RFID ...
  • J. Jean, A. Moradi, T. Peyrin, and P. Sasdrich. Bit-sliding: a generic technique for ...
  • I. Jeon and E. Yoon. A New Ultra-lightweight RFID Authentication Protocol using ...
  • C. Liu, I. Liu, C. Lin, and J. Li. A novel tag searching protocol ...
  • Y. Liu, M. F. Ezerman, and H. Wang. Double verification protocol via secret ...
  • Y. Liu, X. Yin, Y. Dong, and K. Huang. Lightweight authentication scheme with inverse ...
  • F. Moradi, H. Mala, and B. Tork Ladani. Security analysis and strengthening of ...
  • F. Moradi, H. Mala, B. Tork Ladani, and F. Moradi. Security analysis of an ...
  • L. Pang, L. He, Q. Pei, and Y. Wang. Secure and Efficient Mutual Authentication ...
  • On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol [مقاله ژورنالی]
  • M. Safkhani. Cryptanalysis of R2AP an Ultralightweight Authentication Protocol for RFID. ...
  • M. Safkhani, Y. Bendavid, S. Rostampour, and N. Bagheri. On Designing Lightweight RFID Security ...
  • M. Safkhani, M. Hosseinzadeh, M. E. Namin, S. Rostampour, and N. Bagheri. On the (Im) ...
  • E. Taqieddin, H. Al-Dahoud, and K. Mhaidat. Security Analysis and Improvement of Reconstruction ...
  • Y. Tian, G. Chen, and J. Li. A New Ultralightweight RFID Authentication Protocol ...
  • S. Wang, S. Liu, and D. Chen. Security Analysis and Improvement on Two ...
  • S. h. Wang, Z. Han, S. Liu, and D. w. Chen. Security Analysis of RAPP An ...
  • C. Wei, C.Yang, M. Hwang, and A. Chin. Cryptanalysis of Li--Wang Authentication Protocol ...
  • G. Wei and H. Zhang. A lightweight authentication protocol scheme for RFID ...
  • L. Zhou, X. Li, K. Yeh, C. Su, and W. Chiu. Lightweight IoT-based authentication scheme ...
  • X. Zhuang, Y. Zhu, and C. Chang. A New Ultralightweight RFID Protocol for ...
  • نمایش کامل مراجع