Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol
In this work, we present a simple model for the automated cryptanalysis of cryptographic protocols based on meta-heuristic search. We illustrate our approach with a straightforward application in the form of an attack against a slightly simplified version of an ultra-lightweight authentication protocol for RFID environments called SASI. We show how an attack based on Simulated Annealing can efficiently recover the tag’s secret ID, which is the value the protocol is designed to conceal.
Unable to display preview. Download preview PDF.
- 2.Sun, H.-M., Ting, W.-C., Wang, K.-H.: On the Security of Chien’s Ultralightweight RFID Authentication Protocol. Cryptology ePrint Archive, http://eprint.iacr.org/2008/083
- 7.Bernstein, D.J.: The Salsa20 stream cipher, slides of talk at ECRYPT STVL Workshop on Symmetric Key Encryption (2005), http://cr.yp.to/talks.html#2005.05.26
- 8.Pointcheval, D.: A New Identification Scheme Based on the Perceptron Problems. In: Advances in Cryptology Eurocrypt 1995. LNCS, vol. 2199. Springer, Heidelberg (1995)Google Scholar
- 9.Needham, R.M., Wheeler, D.J.: Tea extensions. Technical report, Computer Laboratory. University of Cambridge, Cambridge (October 1997)Google Scholar