期刊文献+

超轻量级双向认证协议PUMAP的安全性分析 被引量:5

Security Analysis of a PUF Based Ultra-Lightweight Mutual Authentication RFID Protocol-PUMAP
在线阅读 下载PDF
导出
摘要 研究基于物理不可克隆函数的超轻量级射频识别技术(RFID)双向认证协议(PUMAP)的安全性.分析该协议的认证过程,发现窃听一次认证过程就能够得到移位操作的移位位数,简化认证协议中的公式,再通过计算可得到阅读器与标签之间的共享秘密信息.此外,PUMAP不能够防止位置跟踪攻击.分析结果表明PUMAP是不安全的,安全性能达不到RFID系统的基本要求. This paper studies the security of two-way authentication protocol (PUMAP) based on ultra-lightweight radio frequency identification(RFID) of physical non-cloning functions. After the analysis of the certification process, it is found that the shift digits of the shift operation can be obtained by hacking one certification process, then the formulas in the certification is simplified, and the secret information is obtained by calculating between reader and tags. In addition, this protocol couldn't prevent location tracking attack. The analysis result shows that PUMAP is not secure, and its safety performance really couldn't satisfy the security requirement of RFID systems.
出处 《北京理工大学学报》 EI CAS CSCD 北大核心 2013年第12期1259-1262,共4页 Transactions of Beijing Institute of Technology
基金 国家自然科学基金资助项目(60217289)
关键词 射频识别技术 物理不可克隆函数 超轻量级 安全分析 radio frequency identification(RFID) physically unclonable functions (PUF) ultra-lightweight security analysis
  • 相关文献

参考文献14

  • 1Juels A, Weis S. Authenticating pervasive devices with human protocols E J. Lecture Notes in Computer Science, 2005,3621:293 - 308.
  • 2Nicholas J H, Manuel B. Secure human identification protocols [J]. Lecture Notes in Computer Science, 2001,2248:52 - 66.
  • 3Gilbert H, Robshaw M J B, Sibert H. HB g: increasing the security and efficiency of HB+ [C]//Pro- ceedings of The Theory and Applications of Cryptographic Techniques 27th Annual International Conference on Advances in Cryptology. Istanbul, Turkey: Springer, 2009 : 361 : 378.
  • 4Peris-Lopez P, Hernandez-Castro J C, Estevez Tapiador J M, et al. M2AP: a minimalist mutual-authentication protocol for low-cost RFIE) tags[J]. Lecture Notes in Computer Science, 2006,4159 : 912 - 923.
  • 5Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M, et al. LMAP: a real lightweight mutual authentication protocol for low cost RFID tags[M]. ES. 11: Hand of Workshop on RFID and Lightweight Crypto, 2006.
  • 6Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M, et al. EMAP: an effcient mutual authentication protocol for low-cost RFID tags[J]. Lecture Notes in Computer Science,2006,4277:352 - 361.
  • 7Chien H Y. SASI: a new ultralightweight rfid authentication protocol providing strong authentication and strong integrity [J]. IEEE Transactions on Dependable and Secure Computing, 2007,4:337 - 340.
  • 8Peris-Lopez P, Hernandez-Castro J C, gstevez-Tapiador J M, et al. Advances in ultra-lightweight cryptography for low-cost rfid tags: gossamer protocol[J] Lecture Notes in Computer Science, 2009,5379 : 56 - 68.
  • 9Gassend B, Clarke D, Devadas S, et al. Silicon physical random functions[C]//Proceedings of the 9th ACM Con[erence on Computer and Communications Security. New York: ACM, 2002:148 - 160.
  • 10Suh E G, Devadas S. Physical unclonable functions for device authentication and secret key generation[C]/ Proceedings of the 44th Annual Design Automation Conference. New York: IEEE, 20079-14.

同被引文献53

  • 1王彦文,薄勇,孙素丽.加密存储芯片AT88SC1616的原理与应用技术[J].单片机与嵌入式系统应用,2004(12):39-42. 被引量:2
  • 2李晖,牛少彰.无线通信安全理论与技术[M].北京:北京邮电大学出版社,2011.
  • 3施腾飞.移动支付安全系统研究与实现[D].北京:北京邮电大学.2012.
  • 4CtfEN Hung-yu. SASI: A New Ultralightweight RFID Authen- tication Protocol Providing Strong Authentication and Strong Integrity [ J ]. Dependable and Secure Computing, IEEE Trans- actions on, 2007, 4(4) : 337-340.
  • 5Martin Feldhofer, Sandra Dominikus, Johannes Wnlkerstorfer. Strong Authentication for RFID Systems Using the AES AI- gotiyhm[ J ]. Cryptographic Hardware and Embedded Systems- CHES 2004, Volume 3156, 2004: 357-370.
  • 6Juels A, Molner D, Wagner D. Security and Privacy Issues in E-Passports[ C ]// International Conference on Security and Privacy for Emerging Areas in Communications Nelworks. Net- works: IEEE, 2005 : 74-88.
  • 7Finkenzeller. RFID Handbook: Fumtamental and Applications in Contactless Smart Cards and Identification [ M ]. New Jersey: John Wiley & Sons, 2003.
  • 8Sarma S E, Weis S A, Engels D W. RFID Syslems and Securi- ty and Privacy Implications[ J ]. Proceedings of the 4th hater- national Workshop on Cryptographic Hardware and Embedded Syslems( CHES 2002). Lectures Notes in Computer Science 2523, Berlin: Springer-Verlag, 2003: 454-469.
  • 9Sama S E, Weis S A, Engels D W. Radio Rrequency htentifi- cation: Secure Risksand Challenges [ J ]. RSA Laboratories Coptobytes, 2003, 6( 1 ) : 2-9.
  • 10Weis S A, Sarma S E, Rivest R L. Security and Privacy As- pects of Low-Cost Radio Frequency Identification Systems [J]. Seeurity in Pervasive Computing. 2004(8): 201-212.

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部