Desynchronization and Traceability Attacks on RIPTA-DA Protocol
Data(s) |
2013
|
---|---|
Resumo |
Recently Gao et al. proposed a lightweight RFID mutual authentication protocol [3] to resist against intermittent position trace attacks and desynchronization attacks and called it RIPTA-DA. They also verified their protocol’s security by data reduction method with the learning parity with noise (LPN) and also formally verified the functionality of the proposed scheme by Colored Petri Nets. In this paper, we investigate RIPTA-DA’s security. We present an efficient secret disclosure attack against the protocol which can be used to mount both de-synchronization and traceability attacks against the protocol. Thus our attacks show that RIPTA-DA protocol is not a RIPTA-DA. |
Identificador | |
Publicador |
Springer Berlin Heidelberg |
Relação |
http://link.springer.com/chapter/10.1007%2F978-3-642-41332-2_4 DOI:10.1007/978-3-642-41332-2_4 Bagheri, Nasour, Gauravaram, Praveen, Safkhani, Masoumeh, & Sanadhya, Somitra Kumar (2013) Desynchronization and Traceability Attacks on RIPTA-DA Protocol. In Radio Frequency Identification. Springer Berlin Heidelberg, Berlin, pp. 57-68. |
Direitos |
Copyright 2013 Springer-Verlag Berlin Heidelberg |
Fonte |
School of Electrical Engineering & Computer Science; Science & Engineering Faculty |
Palavras-Chave | #Systems and Data Security #Data Encryption #e-Commerce/e-business |
Tipo |
Book Chapter |