Passive black-box cryptanalysis of an ultralightweight protocol after eavesdropping one authentication session

Julio Cesar Hernandez-Castro, Pedro Peris-Lopez, Juan E. Tapiador, Raphael C.W. Phan, Tieyan Li

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Abstract

We present a black-box attack that is able to fully recover the secret values shared between entities involved in an authentication protocol. First, we explain how this black-box technique can be successfully applied against the class of protocols commonly known as ultralightweight protocols. Then, the effectiveness of this attack is shown by successfully cryptanalyzing the David-Prasad ultralightweight protocol [1], which is one of the most recent proposals in this research area. We show how we can recover the secret static identifier ID - the most valuable information which the protocol is designed to conceal - after eavesdropping only one protocol session. Our attack compares favorably to previous attacks against this protocol, and constitutes an interesting alternative for the very realistic scenario of attackers having access only to messages exchanged during a single authentication session. We also show how this disclosure attack can be used to mount a very powerful traceability attack that also improves on previous results.

Original languageEnglish
Title of host publicationRadio Frequency Identification System Security. RFIDsec'11 Asia Workshop Proceedings
PublisherIOS Press
Pages3-17
Number of pages15
ISBN (Print)9781607507215
DOIs
Publication statusPublished - 2011
Externally publishedYes
EventWorkshop on RFID Security 2011 - Wuxi, China
Duration: 6 Apr 20118 Apr 2011

Publication series

NameCryptology and Information Security Series
Volume6
ISSN (Print)1871-6431
ISSN (Electronic)1879-8101

Conference

ConferenceWorkshop on RFID Security 2011
Abbreviated titleRFIDse 2011
Country/TerritoryChina
CityWuxi
Period6/04/118/04/11

Keywords

  • Black-box attack
  • cryptanalysis
  • cryptographic protocols
  • ultralightweight cryptography

Cite this