Security analysis of two distance-bounding protocols

作者: Mohammad Reza Sohizadeh Abyaneh

DOI: 10.1007/978-3-642-25286-0_7

关键词:

摘要: In this paper, we analyze the security of two recently proposed distance bounding protocols called "Hitomi" and "NUS" protocols. Our results show that claimed both has been overestimated. Namely, Hitomi protocol is susceptible to a full secret key disclosure attack which not only in violating privacy but also can be exploited for further attacks such as impersonation, mafia fraud terrorist attacks. demonstrates probability success against NUS increased up $(\frac{3}{4})^n$ even slightly more, if adversary furnished with some computational capabilities.

参考文章(16)
Ali Özhan Gürel, Atakan Arslan, Mete Akgün, Non-uniform stepping approach to RFID distance bounding problem DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security. pp. 64- 78 ,(2010) , 10.1007/978-3-642-19348-4_6
Pedro Peris-Lopez, Juan M. Estévez-Tapiador, Jan C. A. van der Lubbe, Julio César Hernández Castro, Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks ,(2009)
Stefan Brands, David Chaum, Distance-bounding protocols theory and application of cryptographic techniques. pp. 344- 359 ,(1994) , 10.1007/3-540-48285-7_30
Rolando Trujillo-Rasua, Benjamin Martin, Gildas Avoine, The Poulidor distance-bounding protocol radio frequency identification security and privacy issues. pp. 239- 257 ,(2010) , 10.1007/978-3-642-16822-2_19
Chong Hee Kim, Gildas Avoine, RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks cryptology and network security. ,vol. 5888, pp. 119- 133 ,(2009) , 10.1007/978-3-642-10433-6_9
Chong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, Olivier Pereira, The Swiss-Knife RFID Distance Bounding Protocol international conference on information security and cryptology. pp. 98- 115 ,(2009) , 10.1007/978-3-642-00730-9_7
Orhun Kara, Süleyman Kardaş, Muhammed Ali Bingöl, Gildas Avoine, Optimal security limits of RFID distance bounding protocols radio frequency identification security and privacy issues. pp. 220- 238 ,(2010) , 10.1007/978-3-642-16822-2_18
Gildas Avoine, Aslan Tchamkerten, An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement international conference on information security. pp. 250- 261 ,(2009) , 10.1007/978-3-642-04474-8_21
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. E. Tapiador, Esther Palomar, Jan C.A. van der Lubbe, Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security international conference on rfid. pp. 45- 52 ,(2010) , 10.1109/RFID.2010.5467258
D. Dolev, A. Yao, On the security of public key protocols IEEE Transactions on Information Theory. ,vol. 29, pp. 198- 208 ,(1983) , 10.1109/TIT.1983.1056650