scispace - formally typeset
Book ChapterDOI

Desynchronization and Traceability Attacks on RIPTA-DA Protocol

Reads0
Chats0
TLDR
Wang et al. as discussed by the authors presented an efficient secret disclosure attack against the protocol, which can be used to mount both de-synchronization and traceability attacks against RIPTA-DA.
Abstract
Recently Gao et al. proposed a lightweight RFID mutual authentication protocol [3] to resist against intermittent position trace attacks and desynchronization attacks and called it RIPTA-DA. They also verified their protocol’s security by data reduction method with the learning parity with noise (LPN) and also formally verified the functionality of the proposed scheme by Colored Petri Nets. In this paper, we investigate RIPTA-DA’s security. We present an efficient secret disclosure attack against the protocol which can be used to mount both de-synchronization and traceability attacks against the protocol. Thus our attacks show that RIPTA-DA protocol is not a RIPTA-DA.

read more

Citations
More filters
Proceedings ArticleDOI

On secure outsourcing of cryptographic computations to cloud

TL;DR: In this paper, the authors present the problem of secure outsourcing of cryptographic computations with RFID technology as the use case together with their ideas, where applicable, that can provide a direction towards solving the problems.
Proceedings ArticleDOI

Software and hardware co-verification for privacy-enhanced passive UHF RFID tag

TL;DR: This work introduces a software and hardware combined functionality verification for a privacy-preserving RFID design that is the digital part of a passive UHF RFID tag with hash-based mutual authentication protocol and privacy-mode switch.
Journal Article

On secure outsourcing of cryptographic computations to cloud

TL;DR: This position paper brings out these challenging problems with RFID technology as the use case together with ideas, where applicable, that can provide a direction towards solving the problems.
References
More filters
Journal ArticleDOI

A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems

TL;DR: A security protocol that can against the intermittent position trace attacks and desynchronization attacks and formally verify the functionality of the proposed scheme by using Colored Petri Nets is proposed.
Related Papers (5)