Privacy of Recent RFID Authentication Protocols

Size: px
Start display at page:

Download "Privacy of Recent RFID Authentication Protocols"

Transcription

1 Privacy of Recent RFID Authentication Protocols Khale Ouafi 1 an Raphael C.-W. Phan 2 1 Laboratoire e sécurité et e cryptographie (LASEC), Ecole Polytechnique Féérale e Lausanne (EPFL), CH-1015, Switzerlan khale.ouafi@epfl.ch 2 Electronic & Electrical Engineering, Loughborough University, LE11 3TU, Leics, Unite Kingom r.phan@lboro.ac.uk Abstract. Privacy is a major concern in RFID systems, especially with wiesprea eployment of wireless-enable interconnecte personal evices e.g. PDAs an mobile phones, creit cars, e-passports, even clothing an tires. An RFID authentication protocol shoul not only allow a legitimate reaer to authenticate a tag but it shoul also protect the privacy of the tag against unauthorize tracing: an aversary shoul not be able to get any useful information about the tag for tracking or iscovering the tag s ientity. In this paper, we analyze the privacy of some recently propose RFID authentication protocols (2006 an 2007) an show attacks on them that compromise their privacy. Our attacks consier the simplest aversaries that o not corrupt nor open the tags. We escribe our attacks against a general untraceability moel; from experience we view this eneavour as a goo practice to keep in min when esigning an analyzing security protocols. Keywors: RFID, authentication protocols, privacy, untraceability, provably secure. 1 Introuction RFIDs are wiely use in inventory control an supply chain management [1, 7, 18, 19, 25], in e-passports [12, 6, 11, 15, 20] e.g. for US visa waiver policies, in contactless creit cars [10]. Thus the aily ealings of the present ay iniviual is in fact a wireless interconnecte network involving interactions both within his connecte personal area network (PAN) among the things carrie in his bag or pocket, an between the PAN an the servers proviing the services an connectivitiy to those things. Among the things that the iniviual is carrying on him woul inclue those that are RFID enable i.e. items he bought from a retail chain, the creit cars in his wallet that he uses to purchase the items, an his e-passport to ientify himself to authorities. Privacy, both in terms of tag anonymity an tag untraceability (or unlinkability), is a significant concern that nees to be aresse if RFIDs are to be as wiely eploye as conceive by proponents. To ate, a rigorous treatment of privacy for RFID moels is still being evelope, notably the work of Avoine [2], Juels an Weis [13], Le, Burmester an e Meeiros [16]; an Vauenay [27, Work one while the author was with LASEC, EPFL.

2 28]. These moels iffer mainly in their treatment of the aversary s ability to corrupt tags. In fact, the recent privacy moels [13, 27, 16, 28] efine privacy in the untraceability sense. This is intuitive since untraceabile privacy (UPriv) is a strictly stronger notion (i.e. it implies) than anonymous privacy (APriv). To see this, note that if there exists an aversary breaking APriv then he can easily also break UPriv; while the converse is not necessarily true. In this paper, we analyze the privacy issues of recently (in 2006 an 2007) propose RFID protocols, namely [8, 14, 24, 4, 9]. Our attacks o not even nee the strong requirement of corrupting tags [26, 13, 27, 17, 16, 28, 22]. To the best of our knowlege, attacks presente here are the first known analyses of ProbIP [8], MARP [14], Auth2 [24], YA-TRAP+ [4], O-TRAP [4] an RIPP-FS [9]. 2 RFID Privacy Moels We escribe for completeness, the general untraceable privacy (UPriv) moel that will be the setting in which we use in later sections to emonstrate how to trace tags an thus show that the schemes o not achieve the notion of untraceable privacy. It is also goo practice to esign an analyze security protocols with reference to a clearly-efine moel [23]. We o not claim to efine a new moel, for our emphasis in this paper is instea on the analysis of the privacy an security issues of recent RFID protocols. In fact, the moel efine herein can be seen as an alternative efinition of the Juels-Weis moel [13] with some ifferences e.g. in constraints put on the aversary (see the iscussion in section 6.1) in a style that is more in line with the Bellare et al. [3] moels for authenticate key exchange (AKE) protocols, for which RFID protocols have close relationship with. A protocol party is a T T ags or R Reaers interacting in protocol sessions as per the protocol specifications until the en of the session upon which each party outputs Accept if it feels the protocol has been normally execute with the correct parties. Aversary A controls the communications between all protocol parties (tag an reaer) by interacting with them as efine by the protocol, formally capture by A s ability to issue queries of the following form: Execute(R, T, i) query. This moels passive attacks, where aversary A gets access to an honest execution of the protocol session i between R an T by eavesropping. Sen(U 1, U 2, i, m) query. This query moels active attacks by allowing the aversary A to impersonate some reaer U 1 Reaers (resp. tag U 1 T ags) in some protocol session i an sen a message m of its choice to an instance of some tag U 2 T ags (resp. reaer U 2 Reaers). This query subsumes the TagInit an ReaerInit queries as well as challenge an response messages in the Juels-Weis moel. Corrupt(T, K) query. This query allows the aversary A to learn the store secret K of the tag T T ags, an which further sets the store secret to K. It captures the notion of forwar security or forwar privacy an the extent of the amage cause by the compromise of the tag s store secret. This is the analog of the SetKey query of the Juels-Weis moel. Test UPriv (U, i) query. This query is the only query that oes not correspon to any of A s abilities or any real-worl event. This query allows to efine the 2

3 inistinguishability-base notion of untraceable privacy (UPriv). If the party has accepte an is being aske a Test query, then epening on a ranomly chosen bit b {0, 1}, A is given T b from the set {T 0, T 1 }. Informally, A succees if it can guess the bit b. In orer for the notion to be meaningful, a Test session must be fresh in the sense of Definition 2. Definition 1 (Partnership & Session Completion) A reaer instance R j an a tag instance T i are partners if, an only if, both have output Accept(T i ) an Accept(R j ) respectively, signifying the completion of the protocol session. Definition 2 (Freshness) A party instance is fresh at the en of execution if, an only if, 1. it has output Accept with or without a partner instance, 2. both the instance an its partner instance (if such a partner exists) have not been sent a Corrupt query. Definition 3 (Untraceable Privacy (UPriv)) Untraceable privacy (UPriv) is efine using the game G playe between a malicious aversary A an a collection of reaer an tag instances. A runs the game G whose setting is as follows. Phase 1 (Learning): A is able to sen any Execute, Sen, an Corrupt queries at will. Phase 2 (Challenge): 1. At some point uring G, A will choose a fresh session on which to be teste an sen a Test query corresponing to the test session. Note that the test session chosen must be fresh in the sense of Definition 2. Depening on a ranomly chosen bit b {0, 1}, A is given a tag T b from the set {T 0, T 1 }. 2. A continues making any Execute, Sen, an Corrupt queries at will, subjecte to the restrictions that the efinition of freshness escribe in Definition 2 is not violate. Phase 3 (Guess): Eventually, A terminates the game simulation an outputs a bit b, which is its guess of the value of b. The success of A in winning G an thus breaking the notion of UPriv is quantifie in terms of A s avantage in istinguishing whether A receive T 0 or T 1, i.e. it correctly guessing b. This is enote by AvA UPriv (k) where k is the security parameter. It remains to remark on the moels other than Juels-Weis, namely the Le- Burmester-e Meeiros (LBM) moel an the Vauenay moel. The LBM moel similarly allows the corruption of tags. Nevertheless, proof of security is in the universal composability (UC) moel [5]. The Vauenay moel [27, 28] is stronger than both the Juels-Weis an Le- Burmester-e Meeiros moels in terms of the aversary s corruption ability. In more etail, it is stronger than the Juels-Weis moel in the sense that it allows corruption even of the two tags use in the challenge phase. It is stronger than the Le-Burmester-e Meeiros moel in the sense that it consiers all its privacy notions even for corrupte tags, in contrast to the Le-Burmester-e Meeiros moel that only consiers corruption for its forwar privacy notion. 3

4 Our choice to escribe our tracing attacks in later sections with reference to a efine moel is for more uniformity between similar attacks on ifferent RFID protocols, an for better clarity to illustrate how an aversary can circumvent the protocols using precise types of interactions that he exploits, as capture by his oracle queries. This will facilitate the task of a esigner when an attempt is mae to reesign an attacke protocol. 3 ProbIP At RFIDSec 07, Castellucia an Soos [8] propose an RFID protocol (ProbIP) that allows tag ientification by legitimate reaers. Its security is base on the SAT problem, which is proven to be in the N P class of complexity. See Fig. 1, where the symbols in bol beneath each evice enotes the store state, an K[a i ] represents the a i -th bit of the l-bit length secret K. The authors of ProbIP gave arguments [8] for its security in the Juels-Weis moel. For simplicity, we assume, an for the rest of this paper, that the reaer an backen atabase server (if it exists) are one entity. This is soun since it is commonly assume by RFID protocol esigners that the channel between the reaer an server are secure. Reaer Database: {..., (ID, K),... } Tag Share Secret: K hello Do P times: generate a i, b i for i = 1... L s.t. a 1,b 1,...,a Fin (ID, K) s.t. L,b L P L i=1 K[ai] bi = L. 2 K satisfies all the equations Fig. 1. The ProIP protocol 3.1 Violation of Anonymous Privacy We first start by two remarks: 1. The tag oes not upate its secret key so at each authentication, some information is leake from the same key. 2. The tag oes not check the authenticity of the reaer, i.e. an aversary can query the tag as many times as he likes. From an information-theoretic point of view, a severe consequence of these two statements is that at one point an aversary will gather enough information to extract the key K from the responses of the tag. Let us consier an aversary that will keep sening hello messages via Sen queries to the tag until he gets l equations. Since at each request tags generate P equations, an aversary woul nee to query the tag n P times. After that, she obtains the following system in which v j i enotes a boolean variable that is set to 1 if the K[i]-th bit of K is present in the j-th equation: 4

5 L i=1 v1 i (K[i] b1 i ) = L 2 L i=1 v2 i (K[i] b2 i ) = L 2... L i=1 vl i (K[i] bl i ) = L 2 (1) As for any boolean v we can write v + v = 1, we replace any K[i] by the value 1 K[i]. As a consequence we can euce that there are as many as 3 n possible equations because every variable K[i] can have three coefficients: 0, 1, 1. This way, the aversary gets a linear system of n equations an n variables that can be solve using stanar methos such as the Gaussian elimination metho. In the case where the n equations are not linearly inepenant, the aversary can still can obtain more equations from the tag by sening Hello messages until she gets enough equations. 3.2 Countermeasure The weakness of this authentication protocol comes from the fact that each roun the avesary gets some information from the same key. So a quick way to counter our attack is to inclue a key-upating mechanism similar to OSK[21] at the en of the protocol using a one-way function. In this case, aversaries o not get more than P equations for each key so that the security proof an reuction to the SAT problem become soun. The resulting protocol is even forwar-private proviing that aversaries o not get sie-channel information from the reaer [28]. 4 MARP MARP is propose by Kim et al. [14] at CARDIS 06. They first escribe a scheme consisting of separate phases, an then escribe a more integrate one. For lack of better names, we enote these as MARP-1 an MARP-2, respectively. Here, a MARP is like a PDA to which several tags coul be attache. The channels between reaer an MARP, an between MARP an tag, are assume by Kim et al. to be insecure. We summarize these schemes in Figs. 2 an 3, which show only the bare minimal etail for unerstaning of our attacks. It suffices to note that K g, Kg e (resp. K m, Km e ) is the private-public key pair of the reaer (resp. MARP). Key t an P IN t are store secrets of the tag. The reaer is referre to [14] for more etaile escriptions. 4.1 Cryptanalysis of MARP-1 Tracing. Note that a 2 is fixe per tag, being a function of a particular tag T t s unique ientifier Ui t an secret key Key t. As the channel between the reaer an the MARP is not confiential, an aversary via Execute queries (i.e. eavesropping) can easily track the movement of T t by checking for matches of a 2 with previously capture values, as long as the encryption is eterministic. 5

6 Reaer MARP Tag (Ientifier Ri g, (K m, Ke m, (Ui t, key pair K g, Kg e ) Ri g, Ke g, Ui t, Key t, P IN t) h(key t), P IN t) h(p IN t ) P IN t Ui t P IN t h(key t ) Pick R r. Pick R. Query E K g e (Ri g R r) a 1 =E g K (E e K m (R r R m)) Pick R m. a r=e K m (E g e K (R m)) a 2 =E g K (E e K m (Ui t E h(keyt ) (Ui t))) E g K (R) E(a t ) R a t =h(r Key t ) Fig. 2. The MARP-1 protocol, comprising 3 phases: setup, privacy protection, an authentication Reaer MARP Tag (Ri g, (K m, Ke m, (Ui t, K g, Kg e ) Ri g, Ke g, Ui t, Key t, P IN t) h(key t), P IN t) Pick R r. Pick R s. Query E g K (Ri g R r) a 1 =E K g e (E K m (R r R )) Pick R. a r=e K m (E g e K (R )) a 2 =E g K (E e K m (Ui t E h(keyt ) (Ui t))) h(key t ) R s a 3 a s=r h(r h(p IN t )) h(p IN t ) R s a 3 =h(key t R s) Fig. 3. The MARP-2 protocol, comprising 2 phases: MARP authentication an tag authentication 6

7 Alternatively, the aversary can replay an ol R from MARP to the tag via Sen queries, an check if the response a t matches the ol value of a t corresponing to the replaye R. We remark that these attacks have less requirement than the ones performe by Juels an Weis [13] on some other oler RFID protocols that require Corrupt queries. Violating the anonymous privacy. Note that the initial setup messages allow to compute z = [P IN t Ui t ] [P IN t h(key t )] = Ui t h(key t ). Then the aversary simply issues Execute queries to be able to compute z, an then issues a Sen query to replace the message R from MARP to the tag with R = 0, an so the tag respons with a t = h(key t ). This allows to compute: z a t = [Ui t h(key t )] h(key t ) = Ui t, an so reveals a potential unique ientifier of the tag, which can be cross-checke against the possible list of ientifiers for a match. 4.2 Tracing MARP-2 MARP-2 also allows tracing. By eavesropping both messages via Execute queries between the reaer an the MARP an between the MARP an the tag, an aversary gets h(key t ) R s an h(p IN t ) R s. By XOR-ing these two values, the aversary gets h(p IN t ) h(key t ) which oes not epen on the session parameters an can be use to trace a tag. This scheme is also vulnerable to a replay attack since the response of the tag oes only epen on the parameters sent by the MARP. So if an aversary sens twice the same message a s via Sen queries, she will get the same response a 3 which can also be use for tracing. 5 Auth2 At PerCom 07, Tan et al. [24] propose two RFID protocols. We are intereste here in the secon protocol, an more exactly to the first variant escribe therein. For lack of better names we simply call it Auth2, see Fig. 4 for a complete escription of the protocol, where r j is a unique ientifier of the reaer, f an h are two collisions-resistant hash functions an h(.) m enotes the function that truncates the output of h to its m first bits. 5.1 Cryptanalysis of Auth2 Definite tracing. It was note by Auth2 esigners that inefinite tracing is possible but not a concern since many tags coul result in the same h(f(r j t i )) m value. We show how this tracing can be mae efinite, i.e. it can precisely track a unique tag, not just a group of them that have the same h(f(r j t i )) m. 7

8 Reaer R j Database: {..., (ID i, t i, f(r j t i)),... } request n i Pick ni. Tag T i Share secret: t i Pick n j. h 1 = h(f(r j t i)). h Check t i s.t. h(f(r j t i)) m = h 1,h 2 1. h2 = h(f(r j t i) n j n i) ID i. Compute ID i = h 2 h(f(r j t i) n j n i). n j,r i Fig. 4. The Auth2 protocol 1. Learning: The aversary eavesrops via Execute queries for a short perio uring the protocol sessions involving tag T 0 an two reaers R 1, R 2 to obtain r 1, h(f(r 1 t 0 )) m an r 2, h(f(r 2 t 0 )) m. 2. Challenge: Some time later, when the aversary wishes to track the tag T 0, he starts a session with the challenge tag T b {T 0, T 1 } replaying r 1 via a Sen query an checks the response from the tag for a match on the first message component with h(f(r 1 t 0 )) m. He starts another session replaying r 2 via a Sen query an checks the response from the tag for a match on the first message component with h(f(r 2 t 0 )) m. With both matches, it is highly likely that this is the same tag whose session he ha initially eavesroppe on, i.e. T b = T 0. Else T b = T 1. Violating the anonymous privacy. When analyzing the anonymous privacy of their Auth2 scheme, the authors [24] assume that the aversary has access to the reaer s list L of ata corresponing to targete tags, i.e. each entry in L is of the form ID i, f(r j t i ). The aversary only nees two entries in L corresponing to the targete tag T i, i.e. ID i, f(r 1 t i ) an ID i, f(r 2 t i ). Issue a Sen query with r 1 in a session, an then another Sen query with r 2 in another session to T i. Check if both responses match f(r 1 t i ) an f(r 2 t i ) respectively. 6 YA-TRAP, YA-TRAP+ an O-TRAP At SecureComm 06, Burmester et al. [4] propose two RFID protocols with formal proofs of security in the universal composability moel [5], namely YA- TRAP+ an O-TRAP. These were inspire by YA-TRAP propose at PerCom 06 by Tsuik [26]. 6.1 YA-TRAP The steps of YA-TRAP [26] are given in Fig. 5, where HMAC is a message authentication coe an PRNG is a pseuo-ranom number generator. It works as follows: a tag is initialize with an initial timestamp t 0 an the top timestamp value t max, as well as with a unique secret value K i. Tags are also assume to be able to compute a PRNG, where PRNG j i enotes the jth invocation by the tag T i of its own PRNG. 8

9 Reaer R j Tag T i Database L: {..., (t j, HMAC Ki (t j)),... } Share secret: K i, t 0, t i, t max t j if (t j < t i) or (t j > t max) h j = PRNG j i. else h j = HMAC Ki (t j) an h j upate t i t j. check t j s.t. (t j, h j) L. Fig. 5. The YA-TRAP protocol The main goal of YA-TRAP s esign was to achieve untraceable privacy (UPriv) with aversaries assume to be able to corrupt tags. Two operating moes were propose [26] for YA-TRAP, namely real-time an batch. The ifference is that for batch moe, responses from tags are collecte by the reaer in batches for later communication to the server for offline processing an ientification. This latter moe is suite for settings e.g. inventory control where tags are assume honest, since they will only be authenticate later in batches rather than online. Thus, this moe is not suitable for applications where feeback is require on the spot, e.g. library check-outs, or retail outlets for both tags in purchase items as well as tags in creit cars. Tsuik observe that it was possible for enial of service (DoS) attacks to be launche towars YA-TRAP, an remarks that DoS resistance is not among the key goals of YA-TRAP. What is more subtile, however, is the fact that a enial-of-service kin of attack coul lea to an aversary being able to track a tag in the YA-TRAP protocol. Tracing tags in real time. In the YA-TRAP specification, it was suggeste [26] that the top value t max of a tag s timestamp nee not be unique but coul instea be share by a batch of tags. Consier a scenario where tags have ifferent t max, operating in real-time moe. Inee, acknowleging the fact that tags are prouce by ifferent manufacturers for iverse applications, it seems inevitable that some tags will have iffering t max. An aversary can trace a tag, i.e. istinguish between two tags (corresponing to a break of the privacy notion in the Juels-Weis moel [13] an the UPriv notion we escribe in Section 2), as follows. For simplicity, assume two tags T 0 an T 1 with respective t max0 an t max1, where t max0 < t max1. 1. Learning: Issue a Sen query with t j = t max0 to a tag T {T 0, T 1 }. Since t max0 is much into the future than current t i value, a response h j = HMAC Ki (t j ) is expecte, irrespective of which tag it is. Furthermore, the tag will upate its local time counter as t i = t max0. This action serves to sen the tag into the future by marking it for future tracing. 2. Challenge: Some time later, when it is esire to trace the tag, issue a Sen query with t j for t max0 < t j < t max1. If T = T 0, it will respon h j = PRNG j i an will not successfully pass the valiation check by the reaer. If T = T 1, it will respon h j = HMAC Ki (t j ) an will successfully pass the valiation 9

10 check. Thus by observing the reaer-tag interaction via Execute queries, an aversary can istinguish between T 0 an T 1 an win the privacy game. Juels an Weis [13] gave two tracing attacks on YA-TRAP that are vali in their privacy moel, thus showing YA-TRAP oes not meet their efinition of strong privacy. Nevertheless, their tracing attacks woul no longer apply in a weaker privacy moel, an in fact one which better moels the practical setting, where the aversary is further restricte by limiting its access to the TagInit message [13] as follows: when the TagInit message is issue to its two selecte tags T 0 an T 1 use uring the challenge phase, the aversary oes not know which one of them was issue the message. This better moels the practical privacy setting as the aversary is unaware uring the learning phase which tag it has querie. In contrast, our attack still applies in this weakene-aversary setting, an thus our result shows that setting a common t max for tags offers more avantage over having iniviual t max for each tag. YA-TRAP was esigne to specifically output a ranom response even if the tag oes not want to be valiate by the reaer, such that an aversary is unable to istinguish between that ranom response an a proper response. Yet, by observing the output of the reaer-tag interaction, i.e. seeing if the tag passes the valiation or not, still allows the istinguishing. In this sense, using the YA-TRAP approach of generating ranom responses by itself is not sufficient to prevent tracing. To reiterate, our attack can be prevente if the aversary is unable to observe the output of the reaer-tag interaction, i.e. it oes not know if the tag successfully passes the reaer s valiation check. This inability in fact correspons to the narrow aversary moel efine in Vauenay s privacy moel [28]. One example setting that fits this narrow moel is the batch moe suggeste by Tsuik [26] for YA-TRAP. Nevertheless, it is worth recalling here that batch moe is not relevant for applications where immeiate feeback is require e.g. retail an library check-outs, an furthermore is only meaningful in the setting where tags are assume to be honest (not usually the case) since they are not authenticate on the spot but later. Cloning. An aversary can issue Sen queries to the tag with arbitrarily many values of t j an obtain the corresponing responses h j. These values allow the tag to be clone so that when the clone tag is querie a particular t j value, it will reply with the capture response h j. The problem here stems from the fact that tag responses h j are pre-computable only with the presence of the tag an not the reaer since the suppose reaer-supplie challenge is a preictable monotonically increasing timestamp t j. 6.2 Tracing YA-TRAP+ with Secon Pass The steps of YA-TRAP+ are shown in Fig. 6, where H K ( ) enotes a keye hash function an the steps preceee by [ ] are optional, an only meant to be use by the reaer if it is felt that DoS attacks are rampant. Legitimate reaers share with the tags their secret keys K i. It turns out that the tracing attack of subsection 6.1 is simpler when applie to YA-TRAP+ if its optional secon pass (preceee in Fig. 6 by [ ]) is mae compulsory. 10

11 Reaer R j Tag T i Database L: {..., (t j, HMAC Ki (t j)),... } Share secret: K i, t 0, t i t,r t Pick r i. if (t > t i) h 1 = H Ki (00 t r t) else r i,h 1 h1 = H Ki (01 r i r t) if (t t i). [ ] r i,h 2 [ ] Calculate h 2 = H Ki (10 r i t) check (t j, HMAC Ki (t j)) L s.t. [ ]check h 2 = H Ki (10 r i t). h 1 = H Ki (00 t r t), if (t > t i) or h 1 = H Ki (01 r i r t). Upate t i t. Fig. 6. The YA-TRAP+ protocol 1. Learning: An aversary first issues Sen queries to the tag T 0 with some r t an a value t that is preictably much larger than the tag s t i, obtaining the response r i, h 1 = H K (00 t r t ). It then intentionally moifies via a Sen query the message h 2 from reaer to tag such that the tag oes not successfully authenticate the reaer an thus the tag oes not upate its internal time counter t i to t. 2. Challenge: Issue a Sen query to the tag in future (i.e. let the challenge tag T b {T 0, T 1 } uring the challenge phase) with the same r t an t. Since t > t i, it will return the response r i, h 1 = H K (00 t r t ) for which h 1 is the same if the challenge tag T b = T 0. Otherwise, the aversary knows T b = T 1. This allows to track the tag an win the privacy game. Note that YA-TRAP+ was specifically esigne to resist the kin of tracing attack on its preecessor YA-TRAP that we mounte in subsection 6.1, an yet this result shows that the optional secon pass of YA-TRAP+ that requires to check h 2 before upating the store secret, although meant to provie aitional security to resist enial of service attacks, will in fact cause the protocol to fall to tracing. 6.3 Tracing O-TRAP The steps of O-TRAP are shown in Fig. 7. The reaer contains a hash table inexe by r i with entries r i, K i where r i an K i correspon to secrets of tags to which it has legitimate access. 1. Learning: An aversary can issue a Sen query to the tag T 0 with ranom values r t repeately, causing the tag to upate its r i each time such that it is way into the future compare to its synchronization with the reaer. 2. Challenge: The aversary observes the future interaction between a tag T b {T 0, T 1 } an a reaer via Execute queries to see if the reaer accepts the tag as vali. If not, then the aversary knows this was the tag that it marke uring the learning phase, i.e. T b = T 0. Else, T b = T 1. Note that this kin of attack has been inepenently applie by Juels an Weis [13] to a couple of other oler RFID protocols. Yet what is interesting as has been 11

12 Reaer R j Database L: {..., (r i, K i),... } check (r i, K i) in DB: s.t. h = H Ki (r t, r i) or h = H Ki (r t, r i). Upate r i H Ki (r i) L. Tag T i Share secret: r i, K i r t r i,h Compute h = H Ki (r t, r i). Fig. 7. The O-TRAP protocol Upate r i H Ki (r i). emonstrate here, is that recent provably secure protocols like YA-TRAP+ an O-TRAP in some sense still allow for tracing. 7 RIPP-FS RIPP-FS was propose by Conti et al. [9] at PerCom 07. The steps of RIPP-FS are given in Fig. 8. Each tag T i is initialize with a tag key KT 0 i that it shares with the reaer, as well as the initial value-pair (K 0, t 0 ) generate by the reaer, where K 0 is the last value in a hash chain K l = w K i = H(K i+1 ) = H l 1 (w), i = 0,..., l 1 for w a see, an t j (j = 0,..., l) is a time interval counter. A tag is also assume to be able to compute a pseuo-ranom number generator (PRNG), where PRNG j i enotes the jth invocation by the tag T i of its own PRNG. One of the goals of RIPP-FS s esign was to achieve untraceable privacy (UPriv) against aersaries able to corrupt tgs, an it is claime to offer more security properties than YA-TRAP, YA-TRAP+ an O-TRAP. Reaer R j Database L: {..., (T i, K j T i, HMAC j K (t j)),... } T i Tag T i Share secret: K j, t j K j,t j δt = t j t j if (δt > 0) an (H δt (K j) = K j) t j = t j, K j = K j, K Ti = H δt (K Ti ), h j = HMAC KTi (t j). else h j = PRNG j i. h j check T i, h j : T i, K j T i, h j L. Fig. 8. The RIPP-FS protocol 12

13 7.1 Tracing Tags We show how to trace tags in the RIPP-FS protocol. 1. Learning: (a) Query Sen to the reaer to initiate two protocol sessions, obtaining (K j, t j ) an (K j+1, t j+1 ), where t j+1 > t j, an K j = H(K j+1 ). (b) Make a Sen query to a tag T 0 with the value (K j+1, t j+1 ). Since this is a vali message generate from the reaer, a response h j = HMAC KTi (t j+1 ) is expecte. More importantly, the tag will upate its time interval counter as t j = t j+1, as well as the other secrets K j = K j+1 an K Ti = H t j+1 tj (K Ti ). 2. Challenge: Some time later, when it is esire to trace the tag, issue a Sen query with (K j, t j ) to the challenge tag T b, an pass the response h j+1 to the reaer. If T b = T 0, it will respon h j+1 = PRNG j i an will not successfully pass the valiation check by the reaer. If T b = T 1, it will respon h j+1 = HMAC Ki (t j ) an will successfully pass the valiation check. Thus by observing the reaer-tag interaction via Execute queries, an aversary can istinguish between T 0 an T 1 an win the privacy game. 8 Concluing Remarks We first provie an alternative escription of privacy moels that captures the notion of untraceable privacy (UPriv) an iscusse its relation to existing moels. This was to pave the way for our analysis results in later sections. We showe how the notion of UPriv cannot be achieve by some recent RFID protocols. Our emphasis in this paper was to analyze the level of untraceable privacy offere by the protocols. We only iscusse reasons why our attacks worke an intentionally i not propose any tweaks nor fixes on the protocols; mainly because there are alreay many available in literature, an so we feel this was not necessary unless there is a serious voi of well esigne provably secure RFID protocols. Final remarks: while a uniformly accepte privacy moel for RFID protocols is still being evelope by the community, the results here serve to strengthen the nee for such a stanar moel to facilitate better esign of RFID protocols that offer both privacy an security. This has to be fulfille if RFIDs are ever to be wiely use by each iniviual within his network space of interconnecte things. References 1. Albertsons Announces Manate, RFID Journal, 5 March, Available online at 2. G. Avoine, Aversarial Moel for Raio Frequency Ientification, Cryptology eprint Archive, report 2005/049, 20 February, Available at IACR eprint Archive, 3. M. Bellare, D. Pointcheval an P. Rogaway, Authenticate Key Exchange Secure against Dictionary Attacks, Avances in Cryptology - EUROCRYPT 00, LNCS 1807, pp ,

14 4. M. Burmester, T.V. Le an B. e Meeiros, Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols, Proceeings of Securecomm 06, pp. 1 9, Full version available at IACR eprint Archive, last revise 5 December R. Canetti, Universally Composable Security: A New Paraigm for Cryptographic Protocols, Proc. IEEE FOCS 01, pp , Full version available at IACR eprint Archive, last revise 13 December D. Carluccio, K. Lemke an C. Paar, E-Passport: The Global Traceability or How to Feel Like a UPS Package, Proceeings of WISA 06, LNCS 4298, pp , CASPIAN, Boycott Benetton, accesse 19 September Available online at 8. C. Castelluccia an M. Soos, Secret Shuffling: A Novel Approach to RFID Private Ientification, Proceeings of RFIDSec 07, pp , M. Conti, R. Di Petro, L.V. Mancini an A. Spognari, RIPP-FS: An RFID Ientification, Privacy Preserving Protocol with Forwar Secrecy, Proceeings of PerCom 07, pp , T.S. Heyt-Benjamin, D.V. Bailey, K. Fu, A. Juels an T. O Hare, Vulnerabilities in First-Generation RFID-enable Creit Cars, Proceeings of Financial Cryptography 07, LNCS, to appear. 11. J.-H. Hoepman, E. Hubbers, B. Jacobs, M. Oostijk an R.W. Schreur, Crossing Borers: Security an Privacy Issues of the European e-passport, Proceeings of IWSEC 06, LNCS 4266, pp , A. Juels, D. Molnar an D. Wagner, Security an Privacy Issues in E-Passports, Proceeings of SecureComm 05, pp , Full version available at IACR eprint Archive, last revise 18 September A. Juels an S.A. Weis, Defining Strong Privacy for RFID, Proceeings of PerCom 07, pp , Full version available at IACR eprint Archive, 7 April S.-C. Kim, S.-S. Yeo an S.K. Kim, MARP: Mobile Agent for RFID Privacy Protection, Proceeings of CARDIS 06, LNCS 3928, pp , E. Kosta, M. Meints, M. Hensen an M. Gasson, An Analysis of Security an Privacy Issues Relating to RFID Enable epassports, Proceeings of IFIP-SEC 07, LNCS, to appear. 16. T.V. Le, M. Burmester an B. e Meeiros, Universally Composable an Forwar- Secure RFID Authentication an Authenticate Key Exchange, Proceeings of ASIACCS 07, pp , Full version available at IACR eprint Archive, 14 February C.H. Lim an T. Kwon, Strong an Robust RFID Authentication Enabling Perfect Ownership Transfer, Proceeings of ICICS 06, LNCS 4307, pp. 1 20, Michelin Embes RFID Tags in Tires, RFID Journal, 17 January, Available online at Mitsubishi Electric Asia Switches on RFID, RFID Journal, 11 September, Available online at J. Monnerat, S. Vauenay an M. Vuagnoux, About Machine-Reaable Travel Documents: Privacy Enhancement using (Weakly) Non-Transferable Data Authentication, Proceeings of RFIDSec 07, pp , M. Ohkubo, K. Suzuki an S. Kinoshita, RFID Privacy Issues an Technical Challenges, Communications of the ACM, Vol. 48, No. 9, pp , R.-I. Paise an S. Vauenay, Mutual Authentication in RFID: Security an Privacy, Proceeings of AsiaCCS 08, to appear. 23. P. Rogaway, On the Role Definitions in an Beyon Cryptography, Proceeings of Asian Computing Science Conference (Asian 2004), LNCS 3321, pp ,

15 24. C.C. Tan, B. Sheng an Q. Li, Serverless Search an Authentication Protocols for RFID, Proceeings of PerCom 07, pp. 3 12, Target, Wal-Mart Share EPC Data, RFID Journal, 17 October, Available online at G. Tsuik, YA-TRAP: Yet Another Trivial RFID Authentication Protocol, Proceeings of PerCom 06, pp , S. Vauenay, RFID Privacy base on Public-Key Cryptography, Proceeings of ICISC 06, LNCS 4296, pp. 1 6, S. Vauenay, On Privacy Moels for RFID, Avances in Cryptology - Asiacrypt 07, LNCS 4833, pp ,

Privacy of recent RFID authentication protocols

Privacy of recent RFID authentication protocols Loughborough University Institutional Repository Privacy of recent RFID authentication protocols This item was submitted to Loughborough University's Institutional Repository by the/an author. Citation:

More information

Traceable privacy of recent provably-secure RFID protocols

Traceable privacy of recent provably-secure RFID protocols Loughborough University Institutional Repository Traceable privacy of recent provably-secure RFID protocols This item was submitted to Loughborough University's Institutional Repository by the/an author.

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

How to Make E-cash with Non-Repudiation and Anonymity

How to Make E-cash with Non-Repudiation and Anonymity How to Make E-cash with Non-Repuiation an Anonymity Ronggong Song an Larry Korba Institute for Information Technology National Research Council of Canaa Ottawa, Ontario K1A 0R6, Canaa {Ronggong.Song, Larry.Korba}@nrc.ca

More information

Efficient RFID authentication scheme for supply chain applications

Efficient RFID authentication scheme for supply chain applications University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2010 Efficient RFID authentication scheme for supply chain applications

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Cryptanalysis and Improvement on a New RFID Mutual Authentication Protocol Compatible with EPC Standard

Cryptanalysis and Improvement on a New RFID Mutual Authentication Protocol Compatible with EPC Standard Cryptanalysis and Improvement on a New RFID Mutual Authentication Protocol Compatible with EPC Standard Mohammad Hassan Habibi Faculty of Electrical Engineering, I.H University Tehran, Iran mohamad.h.habibi@gmail.com

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard

Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard Mohammad Habibi, Mahdi Alagheband, Mohammad Aref To cite this version: Mohammad Habibi, Mahdi Alagheband, Mohammad Aref.

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

(In)security of ecient tree-based group key agreement using bilinear map

(In)security of ecient tree-based group key agreement using bilinear map Loughborough University Institutional Repository (In)security of ecient tree-based group key agreement using bilinear map This item was submitted to Loughborough University's Institutional Repository by

More information

Modelling the Security of Key Exchange

Modelling the Security of Key Exchange Modelling the Security of Key Exchange Colin Boyd including joint work with Janaka Alawatugoda, Juan Gonzalez Nieto Department of Telematics, NTNU Workshop on Tools and Techniques for Security Analysis

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Proofs for Key Establishment Protocols

Proofs for Key Establishment Protocols Information Security Institute Queensland University of Technology December 2007 Outline Key Establishment 1 Key Establishment 2 3 4 Purpose of key establishment Two or more networked parties wish to establish

More information

Efficient RFID Authentication protocol for Ubiquitous Computing Environment

Efficient RFID Authentication protocol for Ubiquitous Computing Environment Efficient RFID Authentication protocol for Ubiquitous Computing Environment Eun Young Choi 1, Su Mi Lee 1, and Dong Hoon Lee 2 Center for Information Security Technologies(CIST), Korea University, 1, 5-Ka,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

Number Theoretic Attacks On Secure Password Schemes

Number Theoretic Attacks On Secure Password Schemes Number Theoretic Attacks On Secure Passwor Schemes Sarvar Patel Bellcore Math an Cryptography Research Group 445 South St, Morristown, NJ 07960, USA sarvar@bellcore.com Abstract Encrypte Key Exchange (EKE)

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Mutual Authentication in RFID

Mutual Authentication in RFID Mutual Authentication in RFID Security and Privacy Radu-Ioan Paise EPFL CH-1015 Lausanne, Switzerland radu-ioan.paise@epfl.ch Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland serge.vaudenay@epfl.ch ABSTRACT

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Cryptanalysis of Some RFID Authentication Protocols

Cryptanalysis of Some RFID Authentication Protocols 20 JOURNAL OF COMMUNICATIONS, VOL. 3, NO. 7, DECEMBER 2008 Cryptanalysis of Some RFID Authentication Protocols Tianjie Cao, Peng Shen School of Computer, China University of Mining and Technology Sanhuannanlu,

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher

Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher Olivier Billet, Jonathan Etrog, and Henri Gilbert Orange Labs RFID systems tags readers back end many types of systems system

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Wide-weak Privacy Preserving RFID Mutual Authentication Protocol

Wide-weak Privacy Preserving RFID Mutual Authentication Protocol Wide-weak Privacy Preserving RFID Mutual Authentication Protocol Raghuvir Songhela Manik Lal Das DA-IICT, Gandhinagar, India. {songhela raghuvir, maniklal das}@daiict.ac.in Abstract Radio Frequency IDentification

More information

Coupon Recalculation for the GPS Authentication Scheme

Coupon Recalculation for the GPS Authentication Scheme Coupon Recalculation for the GPS Authentication Scheme Georg Hofferek an Johannes Wolkerstorfer Graz University of Technology, Institute for Applie Information Processing an Communications (IAIK), Inffelgasse

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer

An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer Süleyman Kardaş,,SerkanÇelik,, Atakan Arslan,andAlbertLevi TÜBITAK BILGEM UEKAE Gebze, Kocaeli Sabancı University, Faculty

More information

A Smart Card Based Authentication Protocol for Strong Passwords

A Smart Card Based Authentication Protocol for Strong Passwords A Smart Card Based Authentication Protocol for Strong Passwords Chin-Chen Chang 1,2 and Hao-Chuan Tsai 2 1 Department of Computer Science and Information Engineering, Feng Chia University, Taichung, Taiwan,

More information

1 Defining Message authentication

1 Defining Message authentication ISA 562: Information Security, Theory and Practice Lecture 3 1 Defining Message authentication 1.1 Defining MAC schemes In the last lecture we saw that, even if our data is encrypted, a clever adversary

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

A modified eck model with stronger security for tripartite authenticated key exchange

A modified eck model with stronger security for tripartite authenticated key exchange A modified eck model with stronger security for tripartite authenticated key exchange Qingfeng Cheng, Chuangui Ma, Fushan Wei Zhengzhou Information Science and Technology Institute, Zhengzhou, 450002,

More information

CordEx. >> Operating instructions. English

CordEx. >> Operating instructions. English CorEx >> Operating instructions English Symbols use in this manual Important information concerning your safety is specifically marke. Follow these instructions closely to prevent accients an amage to

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

NEXT GENERATION NETWORKS: HUMAN-AIDED AND PRIVACY-DRIVEN

NEXT GENERATION NETWORKS: HUMAN-AIDED AND PRIVACY-DRIVEN NEXT GENERATION NETWORKS: HUMAN-AIDED AND PRIVACY-DRIVEN Raphael C.-W. Phan Loughborough University LE11 3TU, UK r.phan@lboro.ac.uk Jean-Philippe Aumasson FHNW 5210 Windisch, Switzerland jeanphilippe.aumasson@gmail.com

More information

HGLAP : Hierarchical Group-index based Lightweight Authentication Protocol for Distributed RFID system

HGLAP : Hierarchical Group-index based Lightweight Authentication Protocol for Distributed RFID system HGLAP : Hierarchical Group-index based Lightweight Authentication Protocol for Distributed RFID system JeaCheol Ha 1, HwanKoo Kim 1, JeaHoon Park 2, SangJae Moon 2, Juanma Gonzalez Nieto 3, and Colin Boyd

More information

Related-key Attacks on Triple-DES and DESX Variants

Related-key Attacks on Triple-DES and DESX Variants Related-key Attacks on Triple-DES and DESX Variants Raphael C.-W. han Department of Engineering, Swinburne Sarawak Institute of Technology, 1st Floor, State Complex, 93576 Kuching, Malaysia rphan@swinburne.edu.my

More information

Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity

Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Base on Complexity Xiangao Huang 1 Wei Huang 2 Xiaozhou Liu 3 Chao Wang 4 Zhu jing Wang 5 Tao Wang 1 1 College of Engineering, Shantou

More information

EPC Tag Authentication with Randomized Characteristics for Strong Privacy

EPC Tag Authentication with Randomized Characteristics for Strong Privacy 182 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.9B, September 2006 EPC Tag Authentication with Randomized Characteristics for Strong Privacy Soohyun Oh, and Jin Kwak,

More information

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,

More information

Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction

Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction Scalable Grouping-proof Protocol for RFID Tags Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction Dang Nguyen Duc Department of Information and Communications Engineering,

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Performance Evaluation of SSL with New Client Authentication

Performance Evaluation of SSL with New Client Authentication University of Aizu, Grauation hesis. March, 2005 s1090215 1 Performance Evaluation of SSL with New Client Authentication akuya Yahagi s1090215 Supervise by iroshi oyoizumi Abstract he purpose of this paper

More information

Analyzing the secure simple pairing in Bluetooth v4.0

Analyzing the secure simple pairing in Bluetooth v4.0 Loughborough University Institutional Repository Analyzing the secure simple pairing in Bluetooth v4.0 This item was submitted to Loughborough University's Institutional Repository by the/an author. Citation:

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

YA-SRAP: Yet Another Serverless RFID Authentication Protocol

YA-SRAP: Yet Another Serverless RFID Authentication Protocol YA-SRAP: Yet Another Serverless RFID Authentication Protocol Sheikh I. Ahamed 1, Farzana Rahman 1, Endadul Hoque 1, Fahim Kawsar 2, and Tatsuo Nakajima 2 1 Ubicomp lab, MSCS Dept., Marquette University,

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

MCMix: Anonymous Messaging via Secure Multiparty Computation

MCMix: Anonymous Messaging via Secure Multiparty Computation MCMix: Anonymous Messaging via Secure Multiparty Computation Nikolaos Alexopoulos 1, Aggelos Kiayias 2, Riivo Talviste 3, an Thomas Zacharias 2 1 Technische Universität Darmstat 2 School of Informatics,

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

6.823 Computer System Architecture. Problem Set #3 Spring 2002

6.823 Computer System Architecture. Problem Set #3 Spring 2002 6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem

More information

Coupon Recalculation for the GPS Authentication Scheme

Coupon Recalculation for the GPS Authentication Scheme Coupon Recalculation for the GPS Authentication Scheme Georg Hofferek an Johannes Wolkerstorfer Graz University of Technology, Institute for Applie Information Processing an Communications (IAIK), Inffelgasse

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important

More information

Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks

Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks An abridged version of this paper appears in the Proc. of the Third IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 8-12 March 2005, Kauai Island,

More information

Group Key Establishment Protocols

Group Key Establishment Protocols Group Key Establishment Protocols Ruxandra F. Olimid EBSIS Summer School on Distributed Event Based Systems and Related Topics 2016 July 14, 2016 Sinaia, Romania Outline 1. Context and Motivation 2. Classifications

More information

Research Statement. Yehuda Lindell. Dept. of Computer Science Bar-Ilan University, Israel.

Research Statement. Yehuda Lindell. Dept. of Computer Science Bar-Ilan University, Israel. Research Statement Yehuda Lindell Dept. of Computer Science Bar-Ilan University, Israel. lindell@cs.biu.ac.il www.cs.biu.ac.il/ lindell July 11, 2005 The main focus of my research is the theoretical foundations

More information

Password Based Authentication Key Exchange in the Three Party

Password Based Authentication Key Exchange in the Three Party Password Based Authentication Key Exchange in the Three Party Er.Nishi Madan¹, Er.Manvinder Singh Nayyar² ¹Assistant Professor, Computer Science & Engineering DAV University, Jalandhar, Punjab (India)

More information

Lecture 14 Alvaro A. Cardenas Kavitha Swaminatha Nicholas Sze. 1 A Note on Adaptively-Secure NIZK. 2 The Random Oracle Model

Lecture 14 Alvaro A. Cardenas Kavitha Swaminatha Nicholas Sze. 1 A Note on Adaptively-Secure NIZK. 2 The Random Oracle Model CMSC 858K Advanced Topics in Cryptography March 11, 2004 Lecturer: Jonathan Katz Lecture 14 Scribe(s): Alvaro A. Cardenas Kavitha Swaminatha Nicholas Sze 1 A Note on Adaptively-Secure NIZK A close look

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Investigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks

Investigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks Journal of Information Security, 2014, 5, 1-11 Publishe Online January 2014 (http://www.scirp.org/ournal/is) http://x.oi.org/10.4236/is.2014.51001 Investigating Approaches of Data Integrity Preservation

More information

A robust smart card-based anonymous user authentication protocol for wireless communications

A robust smart card-based anonymous user authentication protocol for wireless communications University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2014 A robust smart card-based anonymous user authentication

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Proving Vizing s Theorem with Rodin

Proving Vizing s Theorem with Rodin Proving Vizing s Theorem with Roin Joachim Breitner March 25, 2011 Proofs for Vizing s Theorem t to be unwiely unless presente in form a constructive algorithm with a proof of its correctness an termination.

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

Secure and Efficient Tag Searching in RFID Systems using Serverless Search Protocol

Secure and Efficient Tag Searching in RFID Systems using Serverless Search Protocol Secure and Efficient Tag Searching in RFID Systems using Serverless Search Protocol Sheikh I. Ahamed 1, Farzana Rahman 1, Endadul Hoque 1, Fahim Kawsar 2, and Tatsuo Nakajima 2 1 Ubicomp lab, MSCS Dept.,

More information

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal

More information

Strong Privacy for RFID Systems from Plaintext-Aware Encryption

Strong Privacy for RFID Systems from Plaintext-Aware Encryption Strong Privacy for RFID Systems from Plaintext-Aware Encryption Khaled Ouafi and Serge Vaudenay ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE http://lasec.epfl.ch/ supported by the ECRYPT project SV strong

More information

Verifying performance-based design objectives using assemblybased vulnerability

Verifying performance-based design objectives using assemblybased vulnerability Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications Top-own Connectivity Policy Framework for Mobile Peer-to-Peer Applications Otso Kassinen Mika Ylianttila Junzhao Sun Jussi Ala-Kurikka MeiaTeam Department of Electrical an Information Engineering University

More information

Frequency Domain Parameter Estimation of a Synchronous Generator Using Bi-objective Genetic Algorithms

Frequency Domain Parameter Estimation of a Synchronous Generator Using Bi-objective Genetic Algorithms Proceeings of the 7th WSEAS International Conference on Simulation, Moelling an Optimization, Beijing, China, September 15-17, 2007 429 Frequenc Domain Parameter Estimation of a Snchronous Generator Using

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

CONTENT-BASED RETRIEVAL OF DEFECT IMAGES. Jukka Iivarinen and Jussi Pakkanen

CONTENT-BASED RETRIEVAL OF DEFECT IMAGES. Jukka Iivarinen and Jussi Pakkanen Proceeings of ACIVS 2002 (Avance Concepts for Intelligent Vision Systems), Ghent, Belgium, September 9-11, 2002 CONTENT-BASED RETRIEVAL OF DEFECT IMAGES Jukka Iivarinen an Jussi Pakkanen jukka.iivarinen@hut.fi,

More information

Part II Bellare-Rogaway Model (Active Adversaries)

Part II Bellare-Rogaway Model (Active Adversaries) Part II Bellare-Rogaway Model (Active Adversaries) 8th BIU Winter School on Key Exchange, 2018 Marc Fischlin 13. Oktober 2010 Dr.Marc Fischlin Kryptosicherheit 1 Active Attacks Adversary may tamper, drop,

More information

Considering bounds for approximation of 2 M to 3 N

Considering bounds for approximation of 2 M to 3 N Consiering bouns for approximation of to (version. Abstract: Estimating bouns of best approximations of to is iscusse. In the first part I evelop a powerseries, which shoul give practicable limits for

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information