Cryptanalysis of Two Lightweight RFID Authentication Schemes

White Plains, NY(2007)

引用 57|浏览2
暂无评分
摘要
Vajda and Butty¢楼an proposed several lightweight authentication protocols for authenticating RFID tags to readers, and left open the quantifiable cryptographic strength. Our cryptanalysis answers this open question by implementing and measuring attacks against their XOR and SUBSET protocols. A passive eavesdropper can impersonate a tag in the XOR protocol after observing only 70 challenge-response transactions between the tag and reader. In contrast, the theoretical maximum strength of the XOR protocol could have required 16!2 observed transactions to break the key. Our experiments also show that a passive eavesdropper can recover the shared secret used in the XOR protocol by observing an expected 1,092 transactions. Additionally, a nearly optimal active attack against the SUBSET protocol extracts almost one bit of information for each bit emitted by the tag.
更多
查看译文
关键词
authenticating rfid tag,lightweight authentication protocol,theoretical maximum strength,xor protocol,open question,challenge-response transaction,passive eavesdropper,quantifiable cryptographic strength,lightweight rfid authentication schemes,cryptanalysis answer,subset protocol,authentication protocol,rfid tag,rfid tags,cryptographic protocols,authentication,cryptography,probability,cryptanalysis,xor,data mining
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要