License: Creative Commons Attribution 4.0 International license (CC BY 4.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagSemProc.09031.3
URN: urn:nbn:de:0030-drops-19576
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2009/1957/
Go to the corresponding Portal |
Krause, Matthias ;
Stegemann, Dirk
Algebraic Attacks against Linear RFID Authentication Protocols
Abstract
The limited computational resources available on RFID tags imply a
need for specially designed authentication protocols. The light weight
authentication protocol $extsf{HB}^+$ proposed by Juels and Weis seems currently
secure for several RFID applications, but is too slow for many practical
settings.
As a possible alternative, authentication protocols based on choosing
random elements from $L$ secret linear $n$-dimensional subspaces of
$GF(2)^{n+k}$ (so called linear $(n,k,L)$-protocols), have been considered. We show that to a certain extent, these protocols are vulnerable to algebraic
attacks. Particularly, our approach allows to break Cicho'{n}, Klonowski and Kutyl owski's $ extsf{CKK}^2$-protocol, a special linear
$(n,k,2)$-protocol, for practically recommended parameters in less
than a second on a standard PC. Moreover, we show that
even unrestricted $(n,k,L)$-protocols can be efficiently broken if $L$ is too small.
BibTeX - Entry
@InProceedings{krause_et_al:DagSemProc.09031.3,
author = {Krause, Matthias and Stegemann, Dirk},
title = {{Algebraic Attacks against Linear RFID Authentication Protocols}},
booktitle = {Symmetric Cryptography},
pages = {1--18},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2009},
volume = {9031},
editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/opus/volltexte/2009/1957},
URN = {urn:nbn:de:0030-drops-19576},
doi = {10.4230/DagSemProc.09031.3},
annote = {Keywords: RFID Authentication, HB+, CKK, CKK2}
}
Keywords: |
|
RFID Authentication, HB+, CKK, CKK2 |
Collection: |
|
09031 - Symmetric Cryptography |
Issue Date: |
|
2009 |
Date of publication: |
|
30.03.2009 |