2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007 2007
DOI: 10.1109/seccom.2007.4550374
|View full text |Cite
|
Sign up to set email alerts
|

Breaking EMAP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 29 publications
(17 citation statements)
references
References 2 publications
0
17
0
Order By: Relevance
“…Vulnerable designs appeared in recent literature, such as the lightweight authentication protocols presented by Vajda and Buttyán in [68] (whose vulnerabilities were recently reported by Defend, Fu, and Juels in [15]), the set of ultra-lightweight authentication techniques presented by Peris-Lopez et al in [54][55][56] (which were reported as vulnerable to passive [3] and active [44] attacks), and enhancements of these proposals, like the SASI protocol [11] (recently reported by Cao, Bertino, and Lei in [9] as vulnerable), show how challenging it is to design adequate procedures given the constraints. We surveyed lightweight defenses that can be useful to reduce the risk of threats.…”
Section: Discussionmentioning
confidence: 99%
“…Vulnerable designs appeared in recent literature, such as the lightweight authentication protocols presented by Vajda and Buttyán in [68] (whose vulnerabilities were recently reported by Defend, Fu, and Juels in [15]), the set of ultra-lightweight authentication techniques presented by Peris-Lopez et al in [54][55][56] (which were reported as vulnerable to passive [3] and active [44] attacks), and enhancements of these proposals, like the SASI protocol [11] (recently reported by Cao, Bertino, and Lei in [9] as vulnerable), show how challenging it is to design adequate procedures given the constraints. We surveyed lightweight defenses that can be useful to reduce the risk of threats.…”
Section: Discussionmentioning
confidence: 99%
“…The first ultra-lightweight protocols, the minimalist mutualauthentication protocol, lightweight mutual authentication protocol (LMAP), and efficient mutual authentication protocol, announced by Peris et al [16][17][18], were named collectively as the ultra-lightweight mutual authentication protocol (UMAP) for short, and utilized only triangular functions (∨ , ∧ , ⊕) and addition. The UMAP protocols are shown in Table 1 because they have drawn a lot of attention [19][20][21][22][23][24]. Afterwards, Chien et al pointed out the numerous attacks on the UMAP and suggested the inclusion of the rotation operation in their ultra-lightweight protocol, strong authentication and strong integrity (SASI) [5].…”
Section: Related Work In the Ultra-lightweight Categorymentioning
confidence: 99%
“…The weaknesses of protocols based on triangular functions are outlined in [9,[22][23][24]. Barasz et al pinpointed the weakness of least significant bits (LSBs) in triangular bitwise operations and the misusage of OR and AND functions in some messages, which lead to exposure of the ID [22,23].…”
Section: Weaknesses Of Triangular Function-based Protocolsmentioning
confidence: 99%
See 2 more Smart Citations