نتایج جستجو برای: desynchronization attack

تعداد نتایج: 82948  

2002
Robert Bäuml Joachim J. Eggers Roman Tzschoppe

One of the most important practical problems of blind Digital Watermarking is the resistance against desynchronization attacks, one of which is the Stirmark random bending attack in the case of image watermarking. Recently, new blind digital watermarking schemes have been proposed which do not suffer from host-signal interference. One of these quantization based watermarking scheme is the Scala...

Journal: :I. J. Network Security 2018
Rui Xie Bi-yuan Jian Dao-wei Liu

The ownership transfer problems occur during using the RFID tag. In view of the problems of the RFID tag ownership transfer protocol, such as security defects and high computational cost, an improved lightweight RFID tag ownership transfer protocol is proposed in this paper. The improved protocol does not depend on the trusted third party, so that the improved protocol has a wider application s...

Journal: :Security and Communication Networks 2014
Nasour Bagheri Masoumeh Safkhani Pedro Peris-Lopez Juan E. Tapiador

Tian et al. proposed a novel ultralightweight RFID mutual authentication protocol [4] that has recently been analyzed in [1], [2], [5]. In this letter, we first propose a desynchronization attack that succeeds with probability almost 1, which improves upon the 0.25 given by the attack in [1]. We also show that the bad properties of the proposed permutation function can be exploited to disclose ...

Journal: :IACR Cryptology ePrint Archive 2012
Nasour Bagheri Masoumeh Safkhani Pedro Peris-Lopez Juan E. Tapiador

Tian et al. proposed a novel ultralightweight RFID mutual authentication protocol [4] that has recently been analyzed in [1], [2], [5]. In this letter, we first propose a desynchronization attack that succeeds with probability almost 1, which improves upon the 0.25 given by the attack in [1]. We also show that the bad properties of the proposed permutation function can be exploited to disclose ...

Journal: :IACR Cryptology ePrint Archive 2011
Masoumeh Safkhani Nasour Bagheri Majid Naderi

Recently Chen et al. have proposed a RFID access control protocol based on the strategy of indefinite-index and challenge-response. They have claimed that their protocol provides optimal location privacy and resists against man in the middle, spoofed tag and spoofed reader attacks. However, in this paper we show that Chen et al. protocol does not provide the claimed security. More precisely, we...

Journal: :IACR Cryptology ePrint Archive 2015
Sonam Devgan Kaul Amit K. Awasthi

In 2012, Wen and Li proposed a secure and robust dynamic identity based remote user authentication scheme with key agreement using smart cards. They claimed that their scheme is efficient and secure. But in this paper, we demonstrate that their scheme is completely insecure and vulnerable to various known attacks like offline and online password guessing attack, impersonation attack, server mas...

Journal: :IACR Cryptology ePrint Archive 2011
Masoumeh Safkhani Nasour Bagheri Majid Naderi Somitra Kumar Sanadhya

Low cost Radio Frequency IDentification (RFID) tags are increasingly being deployed in various practical applications these days. Security analysis of the way these tags are used in an application is a must for successful adoption of the RFID technology. Depending on the requirements of the particular application, security demands on these tags cover some or all of the aspects such as privacy, ...

2017
Shadi Nashwan

Near Field Communication (NFC) is an attractive technology which is used in several countries for contactless payment operations via mobiles. This technology is suffered from increasing the security weaknesses. In the NFC mobile payment systems, the payment operations are vulnerable to various attacks. Therefore, the authentication protocol in the NFC technology has the highest priority to deve...

Journal: :IACR Cryptology ePrint Archive 2008
Ton van Deursen Sasa Radomirovic

This document consists of a description of attack methodologies and a collection of detailed attacks upon RFID protocols. It is meant to serve as a quick and easy reference and it will be updated as new attacks are found. Currently the only attacks on protocols shown in full detail are the authors’ original attacks with references to similar attacks on other protocols. The main security propert...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید