نمایش مختصر رکورد

dc.contributor.authorSafkhani, M.en_US
dc.date.accessioned1399-07-08T19:32:24Zfa_IR
dc.date.accessioned2020-09-29T19:32:24Z
dc.date.available1399-07-08T19:32:24Zfa_IR
dc.date.available2020-09-29T19:32:24Z
dc.date.issued2018-01-01en_US
dc.date.issued1396-10-11fa_IR
dc.date.submitted2019-05-07en_US
dc.date.submitted1398-02-17fa_IR
dc.identifier.citationSafkhani, M.. (2018). Cryptanalysis of R2AP an Ultralightweight Authentication Protocol for RFID. Journal of Electrical and Computer Engineering Innovations (JECEI), 6(1), 111-118. doi: 10.22061/jecei.2018.1103en_US
dc.identifier.issn2322-3952
dc.identifier.issn2345-3044
dc.identifier.urihttps://dx.doi.org/10.22061/jecei.2018.1103
dc.identifier.urihttp://jecei.sru.ac.ir/article_1103.html
dc.identifier.urihttps://iranjournals.nlai.ir/handle/123456789/68849
dc.description.abstract<strong>Background and Objectives:</strong> To overcome the security flaw of RAPP authentication protocol, Zhuang et al. proposed a novel ultralightweight RFID mutual authentication protocol, called R<sup>2</sup>AP. In this paper, we first propose a new desynchronization attack against this protocol.<br /> <strong>Methods:</strong> To extract the secret ID, linear cryptanalysis is used, which is a tool mostly for attack block ciphers.<br /> <strong>Results: </strong>Our proposed desynchronization attack succeeds with the probability almost 1 and requires an adversary to initiate 1829 sessions of the protocol with the tag. On the other hand, the protocol updates the tag and the reader secretes to provide the tag holder privacy. However, it is shown that a passive adversary who eavesdrops only two sessions of the protocol can trace the tag with the probability of 0.921. In addition, passive attack for which the adversary can extract the secret ID of the tag is presented assuming that the adversary eavesdropped 128 sessions of the protocol, its success probability would be 0.387.<br /> <strong>Conclusion:</strong> It was shown that R<sup>2</sup>AP suffers from desynchronization, traceability, and disclosure attacks, where the two later attacks work in passive adversary model.en_US
dc.format.extent1144
dc.format.mimetypeapplication/pdf
dc.languageEnglish
dc.language.isoen_US
dc.publisherShahid Rajaee Teacher Training Universityen_US
dc.relation.ispartofJournal of Electrical and Computer Engineering Innovations (JECEI)en_US
dc.relation.isversionofhttps://dx.doi.org/10.22061/jecei.2018.1103
dc.subjectR2APen_US
dc.subjectLinear Attacken_US
dc.subjectTraceability Attacken_US
dc.subjectSecret Disclosure Attacken_US
dc.subjectDesynchronization Attacken_US
dc.subjectCommunicationsen_US
dc.subjectSECURITYen_US
dc.titleCryptanalysis of R2AP an Ultralightweight Authentication Protocol for RFIDen_US
dc.typeTexten_US
dc.typeOriginal Research Paperen_US
dc.contributor.departmentComputer Engineering Department, Shahid Rajaee Teacher Training University, Tehran, Iran.en_US
dc.citation.volume6
dc.citation.issue1
dc.citation.spage111
dc.citation.epage118
nlai.contributor.orcid0000-0002-1897-0828


فایل‌های این مورد

Thumbnail

این مورد در مجموعه‌های زیر وجود دارد:

نمایش مختصر رکورد