Detailed Information

Cited 0 time in webofscience Cited 1 time in scopus
Metadata Downloads

Cryptanalysis of Two Recent Ultra-Lightweight Authentication Protocolsopen access

Authors
Servati, Mohammad RezaSafkhani, MasoumehAli, SaqibMalik, Mazhar HussainAhmed, Omed HassanHosseinzadeh, MehdiMosavi, Amir H. H.
Issue Date
Dec-2022
Publisher
MDPI
Keywords
medical wireless sensor network; ultra-lightweight; secret disclosure attack; Cro(.) function; Rank(.) function
Citation
MATHEMATICS, v.10, no.23
Journal Title
MATHEMATICS
Volume
10
Number
23
URI
https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/86677
DOI
10.3390/math10234611
ISSN
2227-7390
Abstract
Radio Frequency Identification (RFID) technology is a critical part of many Internet of Things (IoT) systems, including Medical IoT (MIoT) for instance. On the other hand, the IoT devices' numerous limitations (such as memory space, computing capability, and battery capacity) make it difficult to implement cost- and energy-efficient security solutions. As a result, several researchers attempted to address this problem, and several RFID-based security mechanisms for the MIoT and other constrained environments were proposed. In this vein, Wang et al. and Shariq et al. recently proposed CRUSAP and ESRAS ultra-lightweight authentication schemes. They demonstrated, both formally and informally, that their schemes meet the required security properties for RFID systems. In their proposed protocols, they have used a very lightweight operation called Cro(.) and Rank(.), respectively. However, in this paper, we show that those functions are not secure enough to provide the desired security. We show that Cro(.) is linear and reversible, and it is easy to obtain the secret values used in its calculation. Then, by exploiting the vulnerability of the Cro(.) function, we demonstrated that CRUSAP is vulnerable to secret disclosure attacks. The proposed attack has a success probability of "1 " and is as simple as a CRUSAP protocol run. Other security attacks are obviously possible by obtaining the secret values of the tag and reader. In addition, we present a de-synchronization attack on the CRUSAP protocol. Furthermore, we provide a thorough examination of ESRAS and its Rank(.) function. We first present a de-synchronization attack that works for any desired Rank(.) function, including Shariq et al.'s proposed Rank(.) function. We also show that Rank(.) does not provide the desired confusion and diffusion that is claimed by the designers. Finally, we conduct a secret disclosure attack against ESRAS.
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hosseinzadeh, Mehdi photo

Hosseinzadeh, Mehdi
College of IT Convergence (Department of Software)
Read more

Altmetrics

Total Views & Downloads

BROWSE