Back to Search Start Over

An improved low-cost yoking proof protocol based on Kazahaya’s flaws.

Authors :
Bagheri, Nasour
Safkhani, Masoumeh
Namin, Mojtaba Eslamnezhad
Rostampour, Samad
Source :
Journal of Supercomputing; May2018, Vol. 74 Issue 5, p1934-1948, 15p
Publication Year :
2018

Abstract

Peris-Lopez et al. (J Netw Comput Appl 34:833-845, <xref>2011</xref>) recently provided some guidelines that should be followed to design a secure yoking proof protocol. In addition, conforming to those guidelines and EPC C1-G2, they presented a yoking proof for medical systems based on low-cost RFID tags, named Kazahaya. In this paper, we compromise its security and show how a passive adversary can retrieve secret parameters of a patient’s tag in cost of O(216)<inline-graphic></inline-graphic> off-line PRNG evaluations. Nevertheless, to show other weaknesses of the protocol and rule out any possible improvement by increasing the length of the used PRNG, we present a forgery attack that proves that a generated proof at time tn<inline-graphic></inline-graphic> can be used to forge a valid proof for any desired time tj<inline-graphic></inline-graphic>. The success probability of this attack is ‘1’ and the complexity is negligible. In addition, we present a new lightweight protocol based on 128-bit PRNG function to solve the problems of Kazahaya protocol. In terms of security, we evaluate the new protocol based on formal and informal methods and prove that the improved protocol is not vulnerable to RFID attacks. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
09208542
Volume :
74
Issue :
5
Database :
Complementary Index
Journal :
Journal of Supercomputing
Publication Type :
Academic Journal
Accession number :
129156114
Full Text :
https://doi.org/10.1007/s11227-017-2200-x