Skip to main content
Erschienen in:
Buchtitelbild

2016 | OriginalPaper | Buchkapitel

On the Security of the Algebraic Eraser Tag Authentication Protocol

verfasst von : Simon R. Blackburn, M. J. B. Robshaw

Erschienen in: Applied Cryptography and Network Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Algebraic Eraser has been gaining prominence as SecureRF, the company commercializing the algorithm, increases its marketing reach. The scheme is claimed to be well-suited to IoT applications but a lack of detail in available documentation has hampered peer-review. Recently more details of the system have emerged after a tag authentication protocol built using the Algebraic Eraser was proposed for standardization in ISO/IEC SC31 and SecureRF provided an open public description of the protocol. In this paper we describe a range of attacks on this protocol that include very efficient and practical tag impersonation as well as partial, and total, tag secret key recovery. Most of these results have been practically verified, they contrast with the 80-bit security that is claimed for the protocol, and they emphasize the importance of independent public review for any cryptographic proposal.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Following the creation of the RAIN Industry Alliance, UHF RFID tags are increasingly branded as RAIN RFID tags. These RFID tags operate at 860–960 MHz and are far more constrained than the HF RFID tags that are familiar from public transport and NFC applications.
 
2
The results in this paper are entirely independent of the work in Ben-Zvi et al [7].
 
Literatur
1.
Zurück zum Zitat Ågren, M., Hell, M., Johansson, T., Meier, W.: Grain-128a: a new version of grain-128 with optional authentication. Int. J. Wirel. Mob. Comput. 5(1), 48–59 (2011). InderscienceCrossRef Ågren, M., Hell, M., Johansson, T., Meier, W.: Grain-128a: a new version of grain-128 with optional authentication. Int. J. Wirel. Mob. Comput. 5(1), 48–59 (2011). InderscienceCrossRef
8.
Zurück zum Zitat Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007)CrossRef Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007)CrossRef
12.
Zurück zum Zitat Goldfeld, D., Gunnells, P.: Defeating the Kalka-Teicher-Tsaban linear algebra attack on the Algebraic Eraser, arXiv:1202.0598, February 2012 Goldfeld, D., Gunnells, P.: Defeating the Kalka-Teicher-Tsaban linear algebra attack on the Algebraic Eraser, arXiv:​1202.​0598, February 2012
13.
Zurück zum Zitat Gunnells, P.: On the cryptanalysis of the generalized simultaneous conjugacy search problem and the security of the Algebraic Eraser, arXiv:1105.1141, May 2011 Gunnells, P.: On the cryptanalysis of the generalized simultaneous conjugacy search problem and the security of the Algebraic Eraser, arXiv:​1105.​1141, May 2011
14.
Zurück zum Zitat ISO/IEC 29167-10:2015 - Information technology - Automatic identification and data capture techniques - Part 10: Crypto suite AES-128 security services for air interface communications ISO/IEC 29167-10:2015 - Information technology - Automatic identification and data capture techniques - Part 10: Crypto suite AES-128 security services for air interface communications
15.
Zurück zum Zitat ISO/IEC 29167-11:2014 - Information technology - Automatic identification and data capture techniques - Part 11: Crypto suite PRESENT-80 security services for air interface communications ISO/IEC 29167-11:2014 - Information technology - Automatic identification and data capture techniques - Part 11: Crypto suite PRESENT-80 security services for air interface communications
16.
Zurück zum Zitat ISO/IEC 29167-13:2015 - Information technology - Automatic identification and data capture techniques - Part 13: Crypto suite Grain-128a security services for air interface communications ISO/IEC 29167-13:2015 - Information technology - Automatic identification and data capture techniques - Part 13: Crypto suite Grain-128a security services for air interface communications
17.
Zurück zum Zitat ISO/IEC 29167-12:2015 - Information technology - Automatic identification and data capture techniques - Part 12: Crypto suite ECC-DH security services for air interface communications ISO/IEC 29167-12:2015 - Information technology - Automatic identification and data capture techniques - Part 12: Crypto suite ECC-DH security services for air interface communications
18.
Zurück zum Zitat ISO/IEC 29167-16 - Information technology - Automatic identification, data capture techniques - Part 16: Crypto suite ECDSA-ECDH security services for air interface communications ISO/IEC 29167-16 - Information technology - Automatic identification, data capture techniques - Part 16: Crypto suite ECDSA-ECDH security services for air interface communications
19.
Zurück zum Zitat ISO/IEC 29167-17:2015 - Information technology - Automatic identification and data capture techniques - Part 17: Crypto suite cryptoGPS security services for air interface communications ISO/IEC 29167-17:2015 - Information technology - Automatic identification and data capture techniques - Part 17: Crypto suite cryptoGPS security services for air interface communications
20.
Zurück zum Zitat ISO/IEC 29167-20 - Information technology - Automatic identification, data capture techniques - Part 20: Crypto suite Algebraic Eraser security services for air interface communications. Working Draft ISO/IEC 29167-20 - Information technology - Automatic identification, data capture techniques - Part 20: Crypto suite Algebraic Eraser security services for air interface communications. Working Draft
21.
Zurück zum Zitat Kalka, A., Teicher, M., Tsaban, B.: Short expressions of permutations as products and cryptanalysis of the Algebraic Eraser. Adv. Appl. Math. 49, 57–76 (2012)MathSciNetCrossRefMATH Kalka, A., Teicher, M., Tsaban, B.: Short expressions of permutations as products and cryptanalysis of the Algebraic Eraser. Adv. Appl. Math. 49, 57–76 (2012)MathSciNetCrossRefMATH
22.
Zurück zum Zitat Myasnikov, A., Ushakov, A.: Cryptanalysis of the Anshel-Anshel-Goldfeld-Lemieux key agreement protocol. Groups Complex. Crypt. 1, 63–75 (2009)MathSciNetMATH Myasnikov, A., Ushakov, A.: Cryptanalysis of the Anshel-Anshel-Goldfeld-Lemieux key agreement protocol. Groups Complex. Crypt. 1, 63–75 (2009)MathSciNetMATH
23.
Zurück zum Zitat National Institute of Standards and Technology. FIPS 197: Advanced Encryption Standard, November 2001 National Institute of Standards and Technology. FIPS 197: Advanced Encryption Standard, November 2001
26.
Zurück zum Zitat Seress, Á.: Permutation Group Algorithms. Cambridge University Press, Cambridge (2003)CrossRefMATH Seress, Á.: Permutation Group Algorithms. Cambridge University Press, Cambridge (2003)CrossRefMATH
Metadaten
Titel
On the Security of the Algebraic Eraser Tag Authentication Protocol
verfasst von
Simon R. Blackburn
M. J. B. Robshaw
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-39555-5_1