作者: Ton van Deursen , Saša Radomirović
DOI: 10.1007/978-3-642-16822-2_8
关键词: Computer science 、 Authentication 、 Set (abstract data type) 、 Construct (python library) 、 Executable 、 Principle of compositionality 、 Computer security 、 Internet privacy 、 Class (computer programming) 、 First class 、 Adversary
摘要: We demonstrate two classes of attacks on EC-RAC, a growing set RFID protocols. Our first class concerns the compositional approach used to construct particular revision EC-RAC. invalidate authentication and privacy claims made for that revision. We discuss significance fact is not in general. Our second applies all versions EC-RAC reveals hitherto unknown vulnerabilities latest version It general man-in-the-middle attack executable by weak adversary. We show construction improving narrow-weak private protocols wide-weak indicate specific improvements flaws exhibited this document.