EC-RAC: enriching a capacious RFID attack collection

作者: Ton van Deursen , Saša Radomirović

DOI: 10.1007/978-3-642-16822-2_8

关键词: Computer scienceAuthenticationSet (abstract data type)Construct (python library)ExecutablePrinciple of compositionalityComputer securityInternet privacyClass (computer programming)First classAdversary

摘要: We demonstrate two classes of attacks on EC-RAC, a growing set RFID protocols. Our first class concerns the compositional approach used to construct particular revision EC-RAC. invalidate authentication and privacy claims made for that revision. We discuss significance fact is not in general. Our second applies all versions EC-RAC reveals hitherto unknown vulnerabilities latest version It general man-in-the-middle attack executable by weak adversary. We show construction improving narrow-weak private protocols wide-weak indicate specific improvements flaws exhibited this document.

参考文章(33)
Michael Backes, Birgit Pfitzmann, Michael Waidner, Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes Computer Security – ESORICS 2006. pp. 404- 423 ,(2006) , 10.1007/11863908_25
R. Canetti, Universally composable security: a new paradigm for cryptographic protocols international conference on cluster computing. pp. 136- 145 ,(2001) , 10.1109/SFCS.2001.959888
Cjf Cas Cremers, Scyther : semantics and verification of security protocols Technische Universiteit Eindhoven. ,(2006) , 10.6100/IR614943
John Kelsey, Bruce Schneier, David Wagner, Protocol Interactions and the Chosen Protocol Attack international workshop on security. pp. 91- 104 ,(1997) , 10.1007/BFB0028162
Sergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon, Code-Carrying Authorization european symposium on research in computer security. ,vol. 5283, pp. 563- 579 ,(2008) , 10.1007/978-3-540-88313-5_36
Julien Bringer, Hervé Chabanne, Thomas Icart, Cryptanalysis of EC-RAC, a RFID Identification Protocol cryptology and network security. pp. 149- 161 ,(2008) , 10.1007/978-3-540-89641-8_11
Saša Radomirović, Ton Van Deursen, Sjouke Mauw, Untraceability of RFID protocols international conference on information security. pp. 1- 15 ,(2008) , 10.5555/1789374.1789376
Tzeng Wen-Guey, Hu Chi-Ming, Inter-protocol interleaving attacks on some authentication and key distribution protocols Information Processing Letters. ,vol. 69, pp. 297- 302 ,(1999) , 10.1016/S0020-0190(99)00023-X
JungHoon Ha, SangJae Moon, Jianying Zhou, JaeCheol Ha, A New Formal Proof Model for RFID Location Privacy european symposium on research in computer security. pp. 267- 281 ,(2008) , 10.1007/978-3-540-88313-5_18
Tassos Dimitriou, rfidDOT Proceedings of the 4th international conference on Security and privacy in communication netowrks - SecureComm '08. pp. 34- ,(2008) , 10.1145/1460877.1460921