Strong Authentication and Strong Integrity (SASI) Is Not That Strong

نویسندگان

  • Gildas Avoine
  • Xavier Carpent
  • Benjamin Martin
چکیده

In this work, we present a practical passive attack on SASI, an ultra-lightweight mutual authentication protocol for RFID. This attack can be used to reveal with overwhelming probability the secret ID of the prover by eavesdropping about 2 authentications. The result dismantles SASI and, more generally, provides a new approach that threatens ultra-lightweight authentication protocols.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Relationship between Creativity and Academic Integrity of Students: An Empirical Study of Management Students in India

Purpose: Creativity and integrity are two very important pillars of success for any corporate, and looking at some of the recent corporate frauds and scams across the globe, the present study is an attempt to study the relationship between academic integrity and creativity of students pursuing management education in India. Methodology: The study is descr...

متن کامل

Quantum ciphertext authentication and key recycling with the trap code

We investigate quantum authentication schemes constructed from quantum error-correcting codes. We show that if the code has a property called purity testing, then the resulting authentication scheme guarantees the integrity of ciphertexts, not just plaintexts. On top of that, if the code is strong purity testing, the authentication scheme also allows the encryption key to be recycled, partially...

متن کامل

ارائه طرح احراز اصالت سبک با قابلیت گمنامی و اعتماد در اینترنت اشیا

The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases,   the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...

متن کامل

AuthentiCall: Efficient Identity and Content Authentication for Phone Calls

Phones are used to confirm some of our most sensitive transactions. From coordination between energy providers in the power grid to corroboration of highvalue transfers with a financial institution, we rely on telephony to serve as a trustworthy communications path. However, such trust is not well placed given the widespread understanding of telephony’s inability to provide end-to-end authentic...

متن کامل

Authentication and quality control of some polyherbal oils used in Persian Traditional Medicine (PTM)

Background and objectives: Traditional polyherbal oils are still in use in Persian Traditional Medicine (PTM). Most of these formulations are prepared via traditional procedures such as maceration of herbs in oils or evaporating aqueous herbal extracts in boiling or heating oils as the vehicle. Thus, their quality control, standardization and authentication are real challenges ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010