Skip to main content
Erschienen in:
Buchtitelbild

2018 | OriginalPaper | Buchkapitel

Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols

verfasst von : P. D’Arco, R. De Prisco

Erschienen in: ICT Systems Security and Privacy Protection

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper we focus our attention on the design of several recently proposed ultralightweight authentication protocols and show that the underlying methodology is not sound. Indeed, the common feature of these protocols lies in the use of transforms, which are the main building blocks. We analyze these transforms and show that all of them present some weaknesses, which can be essentially reduced to poor confusion and diffusion in the input-output mappings. Then, exploiting the weaknesses of the transforms, we describe impersonation attacks against the ultralightweight authentication protocols in which they are used: precisely, RCIA, KMAP, SLAP, and SASI\(^{+}\). On average, an attack requires a constant number of interactions with the targeted tag, compared to the allegedly needed exponential number in the informal security analysis. Moreover, since the weaknesses are in the transforms, the attack strategies we describe can be used to subvert any other protocol that uses the same transforms or closely-related ones.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
We refer the interested reader to [2] for an overview of the previous work on ultralightweight authentication protocols.
 
2
Notice that the \(\mathtt{Rot}(x,y)\) operation is equal to the CRshift(x’, s) used in the previous transform. To keep the same notations used in the original papers we are analyzing, we have maintained both of them.
 
3
Notice that in this case we are numbering the bits from left to right in descending order. This is to maintain the same notation used in [4].
 
4
This feature, however, if implemented, exposes the Tag to an easy DoS attack.
 
Literatur
2.
Zurück zum Zitat Avoine, G., Carpenter, X., Hernandez-Castro, J.: Pitfalls in ultralightweight authentication protocol designs. IEEE Trans. Mob. Comput. 15(9), 2317–2332 (2016)CrossRef Avoine, G., Carpenter, X., Hernandez-Castro, J.: Pitfalls in ultralightweight authentication protocol designs. IEEE Trans. Mob. Comput. 15(9), 2317–2332 (2016)CrossRef
3.
Zurück zum Zitat D’Arco, P., De Santis, A.: On ultralightweight RFID authentication protocols. IEEE Trans. Dependable Secure Comput. 8(4), 548–563 (2011)CrossRef D’Arco, P., De Santis, A.: On ultralightweight RFID authentication protocols. IEEE Trans. Dependable Secure Comput. 8(4), 548–563 (2011)CrossRef
4.
Zurück zum Zitat Luo, H., Wen, G., Su, J., Huang, Z.: SLAP: succint and lightweight authentication protocol for low-cost RFID system. Wirel. Netw. 24(1), 69–78 (2016)CrossRef Luo, H., Wen, G., Su, J., Huang, Z.: SLAP: succint and lightweight authentication protocol for low-cost RFID system. Wirel. Netw. 24(1), 69–78 (2016)CrossRef
5.
Zurück zum Zitat Mujahid, U., Najam-ul-Islam, M., Sarwar, S.: A new ultralightweight RFID authentication protocol for passive low cost tags: KMAP. Wirel. Pers. Commun. 94(3), 725–744 (2016)CrossRef Mujahid, U., Najam-ul-Islam, M., Sarwar, S.: A new ultralightweight RFID authentication protocol for passive low cost tags: KMAP. Wirel. Pers. Commun. 94(3), 725–744 (2016)CrossRef
7.
Zurück zum Zitat Mujahid, U., Najam-ul-Islam, M., Raza Jafri, A., Qurat-ulAin, Ali Shami, M.: A new ultralightweight RFID mutual authentication protocol: SASI using recursive hash. Int. J. Distrib. Sens. Netw. 12(2), 1–14 (2016)CrossRef Mujahid, U., Najam-ul-Islam, M., Raza Jafri, A., Qurat-ulAin, Ali Shami, M.: A new ultralightweight RFID mutual authentication protocol: SASI using recursive hash. Int. J. Distrib. Sens. Netw. 12(2), 1–14 (2016)CrossRef
8.
Zurück zum Zitat Safkhani M., Bagheri, N.: Generalized Desynchronization Attack on UMAP: Application to RCIA, KMAP, SLAP and SASI\(^+\) Protocols. Available at https://eprint.iacr.org, 2016/905 (2016) Safkhani M., Bagheri, N.: Generalized Desynchronization Attack on UMAP: Application to RCIA, KMAP, SLAP and SASI\(^+\) Protocols. Available at https://​eprint.​iacr.​org, 2016/905 (2016)
Metadaten
Titel
Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols
verfasst von
P. D’Arco
R. De Prisco
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-99828-2_1

Premium Partner