Skip to main content

Showing 1–4 of 4 results for author: Tapiador, J M E

Searching in archive cs. Search in all archives.
.
  1. arXiv:0910.2115  [pdf, ps, other

    cs.CR

    Security Flaws in a Recent Ultralightweight RFID Protocol

    Authors: Pedro Peris-Lopez, Julio C. Hernandez-Castro, J. M. E. Tapiador, Jan C. A. van der Lubbe

    Abstract: In 2006, Peris-Lopez et al. [1, 2, 3] initiated the design of ultralightweight RFID protocols -with the UMAP family of protocols- involving only simple bitwise logical or arithmetic operations such as bitwise XOR, OR, AND, and addition. This combination of operations was revealed later to be insufficient for security. Then, Chien et al. proposed the SASI protocol [4] with the aim of offering bet… ▽ More

    Submitted 12 October, 2009; originally announced October 2009.

    Comments: 14 pages, 2 figures and 1 table

  2. arXiv:0906.4618  [pdf, other

    cs.CR

    Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks

    Authors: Pedro Peris-Lopez, Julio C. Hernandez-Castro, Christos Dimitrakakis, Aikaterini Mitrokotsa, Juan M. E. Tapiador

    Abstract: The vast majority of RFID authentication protocols assume the proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios an intruder can be located between the prover (tag) and the verifier (reader) and trick this last one into thinking that the prover is in close proximity. This attack is generally known as a relay attack in which scope distance f… ▽ More

    Submitted 20 June, 2010; v1 submitted 25 June, 2009; originally announced June 2009.

    Comments: 31 pages, 10 figures, 1 table

  3. arXiv:0812.0686  [pdf, ps, other

    cs.CR

    Cryptanalysis of the RSA-CEGD protocol

    Authors: Juan M. E. Tapiador, Almudena Alcaide, Julio C. Hernandez-Castro, Arturo Ribagorda

    Abstract: Recently, Nenadić et al. (2004) proposed the RSA-CEGD protocol for certified delivery of e-goods. This is a relatively complex scheme based on verifiable and recoverable encrypted signatures (VRES) to guarantee properties such as strong fairness and non-repudiation, among others. In this paper, we demonstrate how this protocol cannot achieve fairness by presenting a severe attack and also pointi… ▽ More

    Submitted 3 December, 2008; originally announced December 2008.

    Comments: 8 pages, 1 figure

  4. arXiv:0811.4257  [pdf, ps, other

    cs.CR

    Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations

    Authors: Julio C. Hernandez-Castro, Juan M. E. Tapiador, Pedro Peris-Lopez, Jean-Jacques Quisquater

    Abstract: In this work we present the first passive attack over the SASI lightweight authentication protocol with modular rotations. This can be used to fully recover the secret $ID$ of the RFID tag, which is the value the protocol is designed to conceal. The attack is described initially for recovering $\lfloor log_2(96) \rfloor=6$ bits of the secret value $ID$, a result that by itself allows to mount tr… ▽ More

    Submitted 26 November, 2008; originally announced November 2008.