a note on the security of two improved rfid protocols

نویسندگان

m. safkhani

computer engineering department, shahid rajaee teacher training university, tehran, iran n. bagheri

electrical engineering department, shahid rajaee teacher training university, tehran, iran

چکیده

recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probability of the desynchronization attack against the improved version of the jung et al. protocol is (1-2-2n)2, where n is length of the protocol parameters. the attack can be accomplished with just three runs of the protocol. the success probability of the secret disclosure attack against the improved version of the yoon's protocol is almost 1, while the complexity is just two runs of the protocol and doing 216 off-line evaluations of prng function.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A note on the security of two improved RFID protocols

Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...

متن کامل

Desynchronization Attacks on RFID Security Protocols

The characteristics of radio frequency identification (RFID) systems introduce growing security and privacy concerns. RFID systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. Many security protocols for the RFID system have been presented. This paper analyze several of the newest RFID security protocols which proposed by Niu et al., Fu et al....

متن کامل

Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols

In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and MAP, which are recently proposed by Peris-Lopez et al. We identify two effective attacks, namely De-synchronization attack and Full-disclosure attack, against their protocols. The former attack can break the synchronization between the RFID reader and the tag in a singl...

متن کامل

Security of RFID Protocols - A Case Study

In the context of Dolev-Yao style analysis of security protocols, we investigate the security claims of a proposed strong-security RFID authentication protocol. We exhibit a flaw which has gone unnoticed in RFID protocol literature and present the resulting attacks on authentication, untraceability, and desynchronization resistance. We analyze and discuss the authors’ proofs of security. Refere...

متن کامل

a case study of the two translators of the holy quran: tahereh saffarzadeh and laleh bakhtiar

بطورکلی، کتاب های مقدسی همچون قران کریم را خوانندگان میتوان مطابق با پیش زمینه های مختلفی که درند درک کنند. محقق تلاش کرده نقش پیش زمینه اجتماعی-فرهنگی را روی ایدئولوژی های مترجمین زن و در نتیجه تاثیراتش را روی خواندن و ترجمه آیات قرآن کریم بررسی کند و ببیند که آیا تفاوت های واژگانی عمده ای میان این مترجمین وجود دارد یا نه. به این منظور، ترجمه 24 آیه از آیات قرآن کریم مورد بررسی مقایسه ای قرار ...

15 صفحه اول

On the Security of RFID Group Scanning Protocols

A RFID group scanning protocol enables a RFID reader to produce a proof of co-existence of multiple RFID tags. This type of protocol is also referred to as yoking-proof, grouping-proof and co-existence proof. In this letter, we show that all of the previous group scanning protocols are vulnerable to relay attack. key words: yoking-proof, grouping-proof, co-existence-proof, relay attack

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
isecure, the isc international journal of information security

جلد ۸، شماره ۲، صفحات ۱۵۱-۱۵۷

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023