A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol

Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited...

Full description

Saved in:
Bibliographic Details
Published inExpert systems Vol. 31; no. 1; pp. 9 - 19
Main Authors Barrero, David F., Hernández-Castro, Julio César, Peris-Lopez, Pedro, Camacho, David, R-Moreno, María D.
Format Journal Article
LanguageEnglish
Published Oxford Blackwell Publishing Ltd 01.02.2014
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging from the security point of view. Security protocols in RFID environments have to deal with strong computational limitations, and classical protocols cannot be used in this context. There have been several attempts to overcome these limitations in the form of new lightweight security protocols designed to be used in very constrained (sometimes called ultra‐lightweight) RFID environments. One of these proposals is the David–Prasad ultra‐lightweight authentication protocol. This protocol was successfully attacked using a cryptanalysis technique named Tango attack. The capacity of the attack depends on a set of boolean approximations. In this paper, we present an enhanced version of the Tango attack, named Genetic Tango attack, that uses Genetic Programming to design those approximations, easing the generation of automatic cryptanalysis and improving its power compared to a manually designed attack. Experimental results are given to illustrate the effectiveness of this new attack.
Bibliography:ArticleID:EXSY652
MICYT project ABANT - No. TIN2010-19872
istex:B107569871D938BBDB8C16C59F6A626B60337C4D
ark:/67375/WNG-GN7PWCXF-4
ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ISSN:0266-4720
1468-0394
DOI:10.1111/j.1468-0394.2012.00652.x