DeepAI AI Chat
Log In Sign Up

Cryptanalysis of two recently proposed ultralightweight authentication protocol for IoT

07/25/2019
by   Masoumeh Safkhani, et al.
Shahid Rajaee Teacher Training University
0

By expanding the connection of objects to the Internet and their entry to human life, the issue of security and privacy has become important. In order to enhance security and privacy on the Internet, many security protocols have been developed. Unfortunately, the security analyzes that have been carried out on these protocols show that they are vulnerable to one or few attacks, which eliminates the use of these protocols. Therefore, the need for a security protocol on the Internet of Things (IoT) has not yet been resolved. Recently, Khor and Sidorov cryptanalyzed the Wang et al. protocol and presented an improved version of it. In this paper, at first, we show that this protocol also does not have sufficient security and so it is not recommended to be used in any application. More precisely, we present a full secret disclosure attack against this protocol, which extracted the whole secrets of the protocol by two communication with the target tag. In addition, Sidorv et al. recently proposed an ultralightweight mutual authentication RFID protocol for blockchain enabled supply chains, supported by formal and informal security proofs. However, we present a full secret disclosure attack against this protocol as well.

READ FULL TEXT

page 1

page 2

page 3

page 4

10/19/2022

Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication

Radio Frequency Identification (RFID) is a key technology used in many a...
05/27/2019

Cryptanalysis of the SLAP Authentication Protocol

RFID (Radio Frequency Identification) is a powerful technology that, due...
03/21/2022

On Rangasamy's outsourcing algorithm for solving quadratic congruence equations

Outsourcing computation is a desired approach for IoT (Internet of Thing...
10/27/2020

Multi-factor Physical Layer Security Authentication in Short Blocklength Communication

Lightweight and low latency security mechanisms are becoming increasingl...
11/15/2018

It Does Not Follow. Response to "Yes They Can! ..."

This a response to "Yes They Can! ..." (a comment on [5]) by J.S. Shaari...