Desynchronization and Traceability Attacks on RIPTA-DA Protocol


Autoria(s): Bagheri, Nasour; Gauravaram, Praveen; Safkhani, Masoumeh; Sanadhya, Somitra Kumar
Data(s)

2013

Resumo

Recently Gao et al. proposed a lightweight RFID mutual authentication protocol [3] to resist against intermittent position trace attacks and desynchronization attacks and called it RIPTA-DA. They also verified their protocol’s security by data reduction method with the learning parity with noise (LPN) and also formally verified the functionality of the proposed scheme by Colored Petri Nets. In this paper, we investigate RIPTA-DA’s security. We present an efficient secret disclosure attack against the protocol which can be used to mount both de-synchronization and traceability attacks against the protocol. Thus our attacks show that RIPTA-DA protocol is not a RIPTA-DA.

Identificador

http://eprints.qut.edu.au/81616/

Publicador

Springer Berlin Heidelberg

Relação

http://link.springer.com/chapter/10.1007%2F978-3-642-41332-2_4

DOI:10.1007/978-3-642-41332-2_4

Bagheri, Nasour, Gauravaram, Praveen, Safkhani, Masoumeh, & Sanadhya, Somitra Kumar (2013) Desynchronization and Traceability Attacks on RIPTA-DA Protocol. In Radio Frequency Identification. Springer Berlin Heidelberg, Berlin, pp. 57-68.

Direitos

Copyright 2013 Springer-Verlag Berlin Heidelberg

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Palavras-Chave #Systems and Data Security #Data Encryption #e-Commerce/e-business
Tipo

Book Chapter