• ثبت نام
    • ورود به سامانه
    مشاهده مورد 
    •   صفحهٔ اصلی
    • نشریات انگلیسی
    • Journal of Electrical and Computer Engineering Innovations (JECEI)
    • Volume 6, Issue 1
    • مشاهده مورد
    •   صفحهٔ اصلی
    • نشریات انگلیسی
    • Journal of Electrical and Computer Engineering Innovations (JECEI)
    • Volume 6, Issue 1
    • مشاهده مورد
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Cryptanalysis of R2AP an Ultralightweight Authentication Protocol for RFID

    (ندگان)پدیدآور
    Safkhani, M.
    Thumbnail
    دریافت مدرک مشاهده
    FullText
    اندازه فایل: 
    1.118 مگابایت
    نوع فايل (MIME): 
    PDF
    نوع مدرک
    Text
    Original Research Paper
    زبان مدرک
    English
    نمایش کامل رکورد
    چکیده
    Background and Objectives: To overcome the security flaw of RAPP authentication protocol, Zhuang et al. proposed a novel ultralightweight RFID mutual authentication protocol, called R2AP. In this paper, we first propose a new desynchronization attack against this protocol. Methods: To extract the secret ID, linear cryptanalysis is used, which is a tool mostly for attack block ciphers. Results: Our proposed desynchronization attack succeeds with the probability almost 1 and requires an adversary to initiate 1829 sessions of the protocol with the tag. On the other hand, the protocol updates the tag and the reader secretes to provide the tag holder privacy. However, it is shown that a passive adversary who eavesdrops only two sessions of the protocol can trace the tag with the probability of 0.921. In addition, passive attack for which the adversary can extract the secret ID of the tag is presented assuming that the adversary eavesdropped 128 sessions of the protocol, its success probability would be 0.387. Conclusion: It was shown that R2AP suffers from desynchronization, traceability, and disclosure attacks, where the two later attacks work in passive adversary model.
    کلید واژگان
    R2AP
    Linear Attack
    Traceability Attack
    Secret Disclosure Attack
    Desynchronization Attack
    Communications
    SECURITY

    شماره نشریه
    1
    تاریخ نشر
    2018-01-01
    1396-10-11
    ناشر
    Shahid Rajaee Teacher Training University
    سازمان پدید آورنده
    Computer Engineering Department, Shahid Rajaee Teacher Training University, Tehran, Iran.

    شاپا
    2322-3952
    2345-3044
    URI
    https://dx.doi.org/10.22061/jecei.2018.1103
    http://jecei.sru.ac.ir/article_1103.html
    https://iranjournals.nlai.ir/handle/123456789/68849

    مرور

    همه جای سامانهپایگاه‌ها و مجموعه‌ها بر اساس تاریخ انتشارپدیدآورانعناوینموضوع‌‌هااین مجموعه بر اساس تاریخ انتشارپدیدآورانعناوینموضوع‌‌ها

    حساب من

    ورود به سامانهثبت نام

    آمار

    مشاهده آمار استفاده

    تازه ترین ها

    تازه ترین مدارک
    © کليه حقوق اين سامانه برای سازمان اسناد و کتابخانه ملی ایران محفوظ است
    تماس با ما | ارسال بازخورد
    قدرت یافته توسطسیناوب