Cryptanalysis of Tav-128 Hash Function


Autoria(s): Kumar, Ashish; Sanadhya, Somitra Kumar; Gauravaram, Praveen; Safkhani, Masoumeh; Naderi, Majid
Data(s)

2010

Resumo

Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which produce the same hash value under this hash function. We then show a second preimage attack on Tav-128 which succeeds with a complexity of 262 calls to the compression function. Finally, we study the constituent functions of Tav-128 and show that the concatenation of nonlinear functions A and B produces a 64-bit permutation from 32-bit messages. This could be a useful light weight primitive for future RFID protocols.

Identificador

http://eprints.qut.edu.au/81636/

Publicador

Springer

Relação

http://link.springer.com/chapter/10.1007%2F978-3-642-17401-8_10

DOI:10.1007/978-3-642-17401-8_10

Kumar, Ashish, Sanadhya, Somitra Kumar, Gauravaram, Praveen, Safkhani, Masoumeh, & Naderi, Majid (2010) Cryptanalysis of Tav-128 Hash Function. In Progress in Cryptology - INDOCRYPT 2010. Springer, Berlin, pp. 118-130.

Direitos

Copyright 2010 Springer Berlin Heidelberg

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Palavras-Chave #Compression function #Hash function #Tav-128 #Cryptanalysis #RFID
Tipo

Book Chapter