The limited computational resources available on RFID tags imply a need for specially designed authentication protocols. The light weight authentication protocol $extsf{HB}^+$ proposed by Juels and Weis seems currently secure for several RFID applications, but is too slow for many practical settings. As a possible alternative, authentication protocols based on choosing random elements from $L$ secret linear $n$-dimensional subspaces of $GF(2)^{n+k}$ (so called linear $(n,k,L)$-protocols), have been considered. We show that to a certain extent, these protocols are vulnerable to algebraic attacks. Particularly, our approach allows to break Cicho'{n}, Klonowski and Kutyl owski's $ extsf{CKK}^2$-protocol, a special linear $(n,k,2)$-protocol, for practically recommended parameters in less than a second on a standard PC. Moreover, we show that even unrestricted $(n,k,L)$-protocols can be efficiently broken if $L$ is too small.
@InProceedings{krause_et_al:DagSemProc.09031.3, author = {Krause, Matthias and Stegemann, Dirk}, title = {{Algebraic Attacks against Linear RFID Authentication Protocols}}, booktitle = {Symmetric Cryptography}, pages = {1--18}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {9031}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09031.3}, URN = {urn:nbn:de:0030-drops-19576}, doi = {10.4230/DagSemProc.09031.3}, annote = {Keywords: RFID Authentication, HB+, CKK, CKK2} }
Feedback for Dagstuhl Publishing