Strong Authentication and Strong Integrity (SASI) Is Not That Strong
نویسندگان
چکیده
In this work, we present a practical passive attack on SASI, an ultra-lightweight mutual authentication protocol for RFID. This attack can be used to reveal with overwhelming probability the secret ID of the prover by eavesdropping about 2 authentications. The result dismantles SASI and, more generally, provides a new approach that threatens ultra-lightweight authentication protocols.
منابع مشابه
Relationship between Creativity and Academic Integrity of Students: An Empirical Study of Management Students in India
Purpose: Creativity and integrity are two very important pillars of success for any corporate, and looking at some of the recent corporate frauds and scams across the globe, the present study is an attempt to study the relationship between academic integrity and creativity of students pursuing management education in India. Methodology: The study is descr...
متن کاملQuantum ciphertext authentication and key recycling with the trap code
We investigate quantum authentication schemes constructed from quantum error-correcting codes. We show that if the code has a property called purity testing, then the resulting authentication scheme guarantees the integrity of ciphertexts, not just plaintexts. On top of that, if the code is strong purity testing, the authentication scheme also allows the encryption key to be recycled, partially...
متن کاملارائه طرح احراز اصالت سبک با قابلیت گمنامی و اعتماد در اینترنت اشیا
The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases, the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...
متن کاملAuthentiCall: Efficient Identity and Content Authentication for Phone Calls
Phones are used to confirm some of our most sensitive transactions. From coordination between energy providers in the power grid to corroboration of highvalue transfers with a financial institution, we rely on telephony to serve as a trustworthy communications path. However, such trust is not well placed given the widespread understanding of telephony’s inability to provide end-to-end authentic...
متن کاملAuthentication and quality control of some polyherbal oils used in Persian Traditional Medicine (PTM)
Background and objectives: Traditional polyherbal oils are still in use in Persian Traditional Medicine (PTM). Most of these formulations are prepared via traditional procedures such as maceration of herbs in oils or evaporating aqueous herbal extracts in boiling or heating oils as the vehicle. Thus, their quality control, standardization and authentication are real challenges ...
متن کامل