License: Creative Commons Attribution 4.0 International license (CC BY 4.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagSemProc.09031.3
URN: urn:nbn:de:0030-drops-19576
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2009/1957/
Go to the corresponding Portal


Krause, Matthias ; Stegemann, Dirk

Algebraic Attacks against Linear RFID Authentication Protocols

pdf-format:
09031.StegemannDirk.Paper.1957.pdf (0.3 MB)


Abstract

The limited computational resources available on RFID tags imply a
need for specially designed authentication protocols. The light weight
authentication protocol $extsf{HB}^+$ proposed by Juels and Weis seems currently
secure for several RFID applications, but is too slow for many practical
settings.
As a possible alternative, authentication protocols based on choosing
random elements from $L$ secret linear $n$-dimensional subspaces of
$GF(2)^{n+k}$ (so called linear $(n,k,L)$-protocols), have been considered. We show that to a certain extent, these protocols are vulnerable to algebraic
attacks. Particularly, our approach allows to break Cicho'{n}, Klonowski and Kutyl owski's $ extsf{CKK}^2$-protocol, a special linear
$(n,k,2)$-protocol, for practically recommended parameters in less
than a second on a standard PC. Moreover, we show that
even unrestricted $(n,k,L)$-protocols can be efficiently broken if $L$ is too small.

BibTeX - Entry

@InProceedings{krause_et_al:DagSemProc.09031.3,
  author =	{Krause, Matthias and Stegemann, Dirk},
  title =	{{Algebraic Attacks against Linear RFID Authentication Protocols}},
  booktitle =	{Symmetric Cryptography},
  pages =	{1--18},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2009},
  volume =	{9031},
  editor =	{Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/opus/volltexte/2009/1957},
  URN =		{urn:nbn:de:0030-drops-19576},
  doi =		{10.4230/DagSemProc.09031.3},
  annote =	{Keywords: RFID Authentication, HB+, CKK, CKK2}
}

Keywords: RFID Authentication, HB+, CKK, CKK2
Collection: 09031 - Symmetric Cryptography
Issue Date: 2009
Date of publication: 30.03.2009


DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI