2013
DOI: 10.1007/s12243-013-0361-z
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of two lightweight RFID authentication protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
18
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(19 citation statements)
references
References 19 publications
1
18
0
Order By: Relevance
“…More specifically, we first demonstrate an efficient structural attack in Section 3.2, then, in Section 3.3, algebraic attacks that give a far more precise security estimate regarding the feasibility of such attacks against the primitive than the claims in [12]. In Section 3.4.3 we debunk the claim made in [36] of having broken the Dusart-Traoré primitive; in fact we demonstrate that the attack in [36] is not an attack at all. In addition to this analysis, we try to answer the question whether components of the Dusart-Traoré primitive can be salvaged for the design of future light-weight primitives by suggesting potential countermeasures in Section 3.4.4 and conducting a comparative efficiency estimation in Section 3.4.5.…”
Section: Introductionmentioning
confidence: 85%
See 1 more Smart Citation
“…More specifically, we first demonstrate an efficient structural attack in Section 3.2, then, in Section 3.3, algebraic attacks that give a far more precise security estimate regarding the feasibility of such attacks against the primitive than the claims in [12]. In Section 3.4.3 we debunk the claim made in [36] of having broken the Dusart-Traoré primitive; in fact we demonstrate that the attack in [36] is not an attack at all. In addition to this analysis, we try to answer the question whether components of the Dusart-Traoré primitive can be salvaged for the design of future light-weight primitives by suggesting potential countermeasures in Section 3.4.4 and conducting a comparative efficiency estimation in Section 3.4.5.…”
Section: Introductionmentioning
confidence: 85%
“…‚ We conclude the Section by considering what the DusartTraoré primitive actually is (since it cannot be a oneway function), explain why the attack of [36] does not work, and assessing whether further study of some components may lead to secure light-weight primitives in the future.…”
Section: Security Analysismentioning
confidence: 99%
“…In [3,4,[8][9][10][11][12][13][14] ultralightweight authentication mutual protocols for RFID systems have been proposed with several variations in design and primitives but cryptanalysis performed in [5][6][7][19][20][21][22][23][24][25][26][27][28][29][30] highlighted the security loop holes and vulnerabilities in the abovementioned protocols. This raises the need of a new secure and robust ultralightweight mutual authentication protocol to combat against all types of malicious activities.…”
Section: Related Workmentioning
confidence: 99%
“…In [2] traceability attack is carried out. In [3] Disclosure attack was carried out and [4] proved RAPP protocol is not resistance against DE synchronization attack. Paper [5] designed a new attack on RFID systems and introduced a new protocol called ACSP.…”
Section: Rated Workmentioning
confidence: 99%