Book ChapterDOI
Desynchronization and Traceability Attacks on RIPTA-DA Protocol
Nasour Bagheri,Praveen Gauravaram,Masoumeh Safkhani,Somitra Kumar Sanadhya +3 more
- pp 57-68
Reads0
Chats0
TLDR
Wang et al. as discussed by the authors presented an efficient secret disclosure attack against the protocol, which can be used to mount both de-synchronization and traceability attacks against RIPTA-DA.Abstract:
Recently Gao et al. proposed a lightweight RFID mutual authentication protocol [3] to resist against intermittent position trace attacks and desynchronization attacks and called it RIPTA-DA. They also verified their protocol’s security by data reduction method with the learning parity with noise (LPN) and also formally verified the functionality of the proposed scheme by Colored Petri Nets. In this paper, we investigate RIPTA-DA’s security. We present an efficient secret disclosure attack against the protocol which can be used to mount both de-synchronization and traceability attacks against the protocol. Thus our attacks show that RIPTA-DA protocol is not a RIPTA-DA.read more
Citations
More filters
Proceedings ArticleDOI
On secure outsourcing of cryptographic computations to cloud
TL;DR: In this paper, the authors present the problem of secure outsourcing of cryptographic computations with RFID technology as the use case together with their ideas, where applicable, that can provide a direction towards solving the problems.
Proceedings ArticleDOI
Software and hardware co-verification for privacy-enhanced passive UHF RFID tag
TL;DR: This work introduces a software and hardware combined functionality verification for a privacy-preserving RFID design that is the digital part of a passive UHF RFID tag with hash-based mutual authentication protocol and privacy-mode switch.
Journal Article
On secure outsourcing of cryptographic computations to cloud
TL;DR: This position paper brings out these challenging problems with RFID technology as the use case together with ideas, where applicable, that can provide a direction towards solving the problems.
References
More filters
Journal ArticleDOI
A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems
TL;DR: A security protocol that can against the intermittent position trace attacks and desynchronization attacks and formally verify the functionality of the proposed scheme by using Colored Petri Nets is proposed.