On the untraceability of anonymous rfid authentication protocol with constant key lookup
Download
1 / 20

On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup - PowerPoint PPT Presentation


  • 104 Views
  • Uploaded on

On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. Presented By Professor LI Yingjiu. Outline. Background Review the BMM protocol in AsiaCCS’08 Crack the Protocol by three-run interleave attack Crack the supply chain based on our attack

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup' - sachi


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
On the untraceability of anonymous rfid authentication protocol with constant key lookup

On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup

Presented By Professor LI Yingjiu


Outline
Outline Protocol with Constant Key-Lookup

  • Background

  • Review the BMM protocol in AsiaCCS’08

  • Crack the Protocol by three-run interleave attack

  • Crack the supply chain based on our attack

  • Improve the BMM protocol

  • Conclusion


Background
Background Protocol with Constant Key-Lookup

  • It is still a challenge to balance the security and scalability.

  • For example,

    • The OSK protocol needs O(N) hash calculation.

    • Numerous protocols based on tree-structure suffers from de-synchronization attack and compromising attack.

  • It is emergent to setup a protocol balancing both the security and scalability.


Bmm protocol in asiaccs 08
BMM protocol in AsiaCCS’08 Protocol with Constant Key-Lookup

  • Burmester, Medeiros and Motta (BMM) proposed an RFID authentication protocol with constant key-lookup to balance the security requirement and scalability.

  • The protocol is based on challenge-response technique.

  • Guarantee spoofing attack, replay attack, de-synchronization attack, etc..


Overview of bmm protocol
Overview of BMM Protocol Protocol with Constant Key-Lookup


Initiate system
Initiate System Protocol with Constant Key-Lookup


Mutual authentication
Mutual Authentication Protocol with Constant Key-Lookup

  • Tag Reader


Update process
Update Process Protocol with Constant Key-Lookup

  • Tag Reader


Three run interleave attack
Three-run Interleave Attack Protocol with Constant Key-Lookup

  • This attack can trace the same tag by ‘ps=r’.

  • The reason is updating ‘ps’ inappropriately.

  • Include three steps.


Three run interleave attack run 1
Three-run Interleave Attack---Run 1 Protocol with Constant Key-Lookup


Three run interleave attack run 2
Three-run Interleave Attack---Run 2 Protocol with Constant Key-Lookup

Not Update ‘r’


Three run interleave attack run 3
Three-run Interleave Attack---Run 3 Protocol with Constant Key-Lookup


Discussion
Discussion Protocol with Constant Key-Lookup

  • Note that in the third run, a different challenge c’’ could be used by a trusted reader to challenge the tag. As long as the ‘r’ value is not updated in the second run, the ‘ps’ value is still the same as the one in the first run.


Crack the whole supply chain
Crack the Whole Supply Chain Protocol with Constant Key-Lookup

  • Three assumptions:

    • Trusted zone

    • One-time authentication

    • Sticky adversary

  • Two attack strategies:

    • Trace a single tag

    • Trace multiple tags


Crack a supply chain system based on bmm protocol
Crack a Supply Chain System Based on BMM Protocol Protocol with Constant Key-Lookup


Trace a single tag
Trace a Single Tag Protocol with Constant Key-Lookup


Trace multiple tags
Trace Multiple Tags Protocol with Constant Key-Lookup

  • Adversary’s database for tracing multiple tags


Improve bmm protocol
Improve BMM Protocol Protocol with Constant Key-Lookup


Conclusion
Conclusion Protocol with Constant Key-Lookup

  • Under a weak adversary model, an attacker can launch a three-run interleave attack to trace and identify a tag.

  • Attackers can crack the whole supply chain using BMM protocol.

  • We improve BMM protocol to prevent tags from tracing.

  • The improved Protocol is same efficient as BMM protocol.


Thanks Protocol with Constant Key-Lookup

Q&A


ad