2009
DOI: 10.1007/978-3-642-03944-7_4
|View full text |Cite
|
Sign up to set email alerts
|

Algebraic Attacks on RFID Protocols

Abstract: Abstract. This work aims to identify the algebraic problems which enable many attacks on RFID protocols. Toward this goal, three emerging types of attacks on RFID protocols, concerning authentication, untraceability, and secrecy are discussed. We demonstrate the types of attacks by exhibiting previously unpublished vulnerabilities in several protocols and referring to various other flawed protocols.The common theme in these attacks is the fact that the algebraic properties of operators employed by the protocol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
76
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 56 publications
(76 citation statements)
references
References 29 publications
0
76
0
Order By: Relevance
“…However, CRC is a homomorphism function and CRC(a ⊕ b) = CRC(a) ⊕ CRC(b). This property leads to a fundamental algebraic weakness, taking the attention off of CRC-based protocols [10]. Protocols based on PUFs have also been claimed as ultra-lightweight.…”
Section: Related Work and Repeated Weaknessesmentioning
confidence: 99%
See 2 more Smart Citations
“…However, CRC is a homomorphism function and CRC(a ⊕ b) = CRC(a) ⊕ CRC(b). This property leads to a fundamental algebraic weakness, taking the attention off of CRC-based protocols [10]. Protocols based on PUFs have also been claimed as ultra-lightweight.…”
Section: Related Work and Repeated Weaknessesmentioning
confidence: 99%
“…The authors in [10], defined 3 attacks and the RFID protocols where each is effective. Their work showed the success of algebraic attacks on protocols based on associative operations, such as triangular functions and modular addition.…”
Section: Weaknesses Of Triangular Function-based Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…Song also proposes a set of protocols for secure ownership transfer based on earlier work by Song and Mitchell [6]. However, this set of protocols suffers from the same flaws that are described in Section 5 and by Van Deursen and Radomirović [8].…”
Section: Related Workmentioning
confidence: 99%
“…Since the wireless communication channel is insecure, it can be eavesdropped by an adversary. Hence, each authentication protocol should be designed in a way that the adversary, with reasonable computational capabilities, does not be able to exploit the exchanged messages [7].…”
Section: Introductionmentioning
confidence: 99%