Paper 2013/453

Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags

Nasour Bagheri and Masoumeh Safkhani

Abstract

Peris-Lopez et al. recently provides some guidelines that should be followed to design a secure yoking-proof protocol. In addition, conforming to those guidelines and EPC C1 G2, they presented a yoking-proof for low-cost RFID tags, named Kazahaya. However, in this letter, we scrutinize its security showing how an passive adversary can retrieve secret parameters of patient's tag in cost of O(216) o-line PRNG evaluations. Given the tag's secret parameters, any security claims are ruined. Nevertheless, to show other weaknesses of the protocol and rule out any possible improvement by increasing the length of the used PRNG, we presented a forgery attack that shows that a proof generated at time tn can be used to forge a valid proof for any desired time tj . The success probability of this attack is `1' and the complexity is negligible.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Unknown where it was published
Keywords
RFIDAuthenticationYoking-ProofCryptanalysis.
Contact author(s)
na bagheri @ gmail com
History
2013-07-22: received
Short URL
https://ia.cr/2013/453
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2013/453,
      author = {Nasour Bagheri and Masoumeh Safkhani},
      title = {Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost {RFID} Tags},
      howpublished = {Cryptology {ePrint} Archive, Paper 2013/453},
      year = {2013},
      url = {https://eprint.iacr.org/2013/453}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.