2014
DOI: 10.3390/s140406500
|View full text |Cite
|
Sign up to set email alerts
|

EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen

Abstract: This paper analyzes the cryptographic security of J3Gen, a promising pseudo random number generator for low-cost passive Radio Frequency Identification (RFID) tags. Although J3Gen has been shown to fulfill the randomness criteria set by the EPCglobal Gen2 standard and is intended for security applications, we describe here two cryptanalytic attacks that question its security claims: (i) a probabilistic attack based on solving linear equation systems; and (ii) a deterministic attack based on the decimation of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
35
0
2

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(38 citation statements)
references
References 30 publications
1
35
0
2
Order By: Relevance
“…However, looking security and privacy that is beginning to be newly requested to RFID, security evaluation has not been done well. Further, there is even the security evaluation by the author, also those attacks as J3Gen [5] and Grain has been reported. There is a Warbler as one of those who have not been reported for about attack and have the security assessment to the author, but the key length is less than 80bit.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, looking security and privacy that is beginning to be newly requested to RFID, security evaluation has not been done well. Further, there is even the security evaluation by the author, also those attacks as J3Gen [5] and Grain has been reported. There is a Warbler as one of those who have not been reported for about attack and have the security assessment to the author, but the key length is less than 80bit.…”
Section: Related Workmentioning
confidence: 99%
“…Next, a description will be given of WGP to be used in the WG. Input is referred to as x (x ∈ F 5 2 ). WGP is expressed by the following equation.…”
Section: Security Analysis Of Our Previous Proposal Modelmentioning
confidence: 99%
“…It is also very important that the pseudo-random sequence generator algorithm is lightweight because of the limited computational, memory but also energy resources of the NB-IoT nodes [ 49 ]. Typically, this random number generator algorithm should be implementable on a basic 8-bit microcontroller and its hardware complexity in terms of its gate equivalence (GE) should prove its low complexity.…”
Section: The Proposed Intelligent Mixed Approachmentioning
confidence: 99%
“…, the LFSR clock, as well as the clock of the physical source of randomness, and the one controlling the selection of polynomials) are not synchronized. Therefore, the list of polynomials (no matter the value of ℓ ) would never be applied as suggested in [ 4 , 5 ]. This makes infeasible the deterministic attack proposed by Peinado et al , as well as all the remainder figures, algorithms and boundaries provided in their analysis of J3Gen.…”
Section: Remarks On the Peinado Et Al Analysismentioning
confidence: 99%
“…J3Gen is intended for security, improving the one-time-pad cipher unpredictability. The security of this generator was very recently claimed by Peinado et al to be weak in [ 4 , 5 ]. In their work, Peinado et al also present a deterministic attack based on the decimation of the J3Gen output sequences.…”
Section: Introductionmentioning
confidence: 99%