Zahra Ahmadian z_ahmadian@sbu.ac.ir Recursive Linear and Differential Cryptanalysis of Ultra-lightweight Authentication Protocols Zahra Ahmadian z_ahmadian@sbu.ac.ir.

Slides:



Advertisements
Similar presentations
“Advanced Encryption Standard” & “Modes of Operation”
Advertisements

1 An Ultra-lightweight Authentication Protocol in RFID Speaker: 魏家惠.
Differential Fault Analysis on AES Variants Kazuo Sakiyama, Yang Li The University of Electro-Communications Nagoya, Japan.
An Introduction to Stream Ciphers Zahra Ahmadian Electrical Engineering Department Sahrif University of Technology
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Every Bit Counts – Fast and Scalable RFID Estimation Muhammad Shahzad and Alex X. Liu Dept. of Computer Science and Engineering Michigan State University.
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
Hash functions a hash function produces a fingerprint of some file/message/data h = H(M)  condenses a variable-length message M  to a fixed-sized fingerprint.
FEAL FEAL 1.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
RFID Security and Privacy Part 2: security example.
IEEE Wireless Local Area Networks (WLAN’s).
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
1 Message Authentication and Hash Functions Authentication Requirements Authentication Functions Message Authentication Codes Hash Functions Security of.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Panagiotis Rizomiliotis and Stefanos Gritzalis Dept. of Information and Communication Systems Engineering University of the Aegean, Greece GHB#: A Provably.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Message Authentication Code July Message Authentication Problem  Message Authentication is concerned with:  protecting the integrity of a message.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
WEP Protocol Weaknesses and Vulnerabilities
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
IPSEC : KEY MANAGEMENT PRESENTATION BY: SNEHA A MITTAL(121427)
Lecture 2: Introduction to Cryptography
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
Overview of the security weaknesses in Bluetooth Dave Singelée COSIC seminar 11/06/2003.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Giuseppe Bianchi Warm-up example WEP. Giuseppe Bianchi WEP lessons  Good cipher is far from being enough  You must make good USAGE of cipher.
Real-life cryptography Pfeiffer Alain.  Types of PRNG‘s  History  General Structure  User space  Entropy types  Initialization process  Building.
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Message Authentication Code
Computer Security Revision Week
Towards 5G AKE: The security and privacy of 3G/4G AKA
CS457 Introduction to Information Security Systems
Encryption and Integrity
Symmetric Cryptography
Home: Tel: , H.P.: Office: 공) 7710A
Advanced Computer Networks
WEP & WPA Mandy Kershishnik.
Cryptographic Hash Function
Presented by: Dr. Munam Ali Shah
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
Cryptography Lecture 13.
Cryptography Basics and Symmetric Cryptography
RFID Security & Privacy at both Physical and System Levels - Presentation to IoT-GSI 26th August 2011 Robert H. Deng & Yingjiu Li School of Information.
January 15th Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security protocol for Body area networks]
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
IEEE i Dohwan Kim.
Security through Encryption
Message Authentication and Hash Functions
Chapter 11 – Message Authentication and Hash Functions
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
An Improved Novel Key Management Protocol for RFID Systems
Cryptography Lecture 14.
Hashing Hash are the auxiliary values that are used in cryptography.
Introduction to Cryptography
Cryptography Lecture 13.
Hash Function Requirements
CRYPTOGRAPHY & NETWORK SECURITY
By: Anthony Gervasi & Adam Dickinson
Presentation transcript:

Zahra Ahmadian z_ahmadian@sbu.ac.ir Recursive Linear and Differential Cryptanalysis of Ultra-lightweight Authentication Protocols Zahra Ahmadian z_ahmadian@sbu.ac.ir

Overview Lightweight Systems Ultra-lightweight Authentication Protocol Recursive Linear Cryptanalysis Yeh et al. Recursive Differential Cryptanalysis SASI Protocol

RFID Technology Radio Frequency IDentification (RFID) is a technology for automatically unique identification or tracking of the objects using wireless systems. secure

RFID Technology Widespread applications regarded as the predecessor technology for ubiquitous computing technology

Security threads Two main security concerns Privacy Authentication

Ultra lightweight Protocols Ultra lightweight environments: Typical: a few cents 5-10k GE per tag (250-3000 GE for security) For comparison AES: 2400 GE MD5: 8000GE SHA-3: 3000-5500 GE

Two approaches Using ultralightweight primitives: block ciphers and hash functions, recently AE schemes. Using ultralightweight authentication protocols.

RFID authentication protocols A classification of LW prtocols (Chein 2007): full-fledged class : e.g. elliptic curve based conventional cryptographic functions (symmetric encryption, cryptographic hash function, or even the public key algorithms) Simple : e.g. challenge response based random number generator and one-way hashing function Lightweight: e.g HB family random number generator CRC checksum but not hash functions Ultra lightweight: e.g. SASI simple bitwise operations (like XOR, AND, OR, modular addition, etc.)

General View of ULW Protocols

Common features Use of Index Pseudonym IDS, the static identifier, ID , is never sent in clear. Use of T-Functions: XOR, modular addition, AND, (Rotations) Desynchronization Attack Prevention the party that first updates its state keeps a backup of its previous state as well.

Recursive Linear Cryptanalysis

Recursive Linear Cryptanalysis Determine all the unknown variables Write a linear representation for the ith bit involving known and unknown variables, then create a system of linear equations for each bit i. Solve systems of equations from LSB and retrieves all secret data bits recursively, starting from LSB.

Recursive Linear Cryptanalysis Exclusive use of T-functions T-function: This attack is completely different from linear cryptanalysis of symmetric primitives [Matsoi’93]

Yeh et al. Protocol (RFIDsec Asia’ 10) Reader: ID, Tag : ID, (IDS,K) If IDS is new: K=K, f=0 If IDS is old: K=ID, f=1

RL Cryptanalysis of Yeh et al. Determine all the unknown variables (static and dynamic secrets and nonces) for a single session.

RL Cryptanalysis of Yeh et al. 2. Find a linear representation for the ith bit of each message. Define intermediate variables (carries or barrows) . Try to find a sufficient independent linear equations. (For the case )

RL Cryptanalysis of Yeh et al.

RL Cryptanalysis of Yeh et al. 3. Solve the system of equation starting from LSB. i

Attack summary Passive Deterministic (Psuccess=1) requires only a single authentication session ( flag=1) Full disclosure of all secrets

Attack summary Attack Type Assumption Ref. Full disclosure of ID Passive , Probabilistic, An average of 250 sessions Peris-Lopez et al.(2010) Traceability Passive, Advantage = 1/2 Desynchronization Active, Man-in-the-middle Avoin et al. (2011) Passive , Probabilistic, An average of 25 sessions Full disclosure of all secrets Passive , Deterministic , a single session Our attack

Recursive Differential Cryptanalysis

number of independent equations < number of unknowns  RD Cryptanalysis What should be done if Using the messages of one or more new sessions?  brings new unknown variables as much as or even more than new equations. A more powerful attack that can generate enough independent equations  number of independent equations < number of unknowns 

RD cryptanalysis basis Attacker forces two parties to run new sessions in their previous state. giving new equations without new variables. Only new nonces are generated in each session. new nonces have (usually) a clear differential relation (xor or modular addition) with the old ones. Demands a kind of active attacker (relatively weak)

SASI Protocol (IEEE transactions on dependable an secure computing 2007) Reader : ID, (IDS, K1, K2) Tag: ID,

RD cryptanalysis of SASI Phase 1. Data gathering Allow two parties to run the first session Block the last message of the next s sessions, Save all the messages corresponding to these sessions

RD cryptanalysis of SASI Phase 2. Secret recovery. Determine all the unknown variables (static and dynamic secrets and nonces) for . Determine also new unknown variables (nonces only) for d . Express clearly the (xor or modular addition) differential relation of the nonces. 𝐼𝐷, 𝐾1, 𝐾2, 𝑛1, 𝑛2, 𝑛 1 ′ , 𝑛2′

RD cryptanalysis of SASI

RD cryptanalysis of SASI 2. Write the linear expansion of an appropriate message of d and for bit i. The differences of them results in a linear equation involving bit i-1 of secrets with random coefficients.

RD cryptanalysis of SASI Differences of Bit representations result in:

RD cryptanalysis of SASI Thus, for each differential pair of sessions Bit representation of C:

RD cryptanalysis of SASI 3. With a sufficient number of equations, there will be an overdefined system of linear equations for each bit. Solve the systems of equations starting from the LSB.

RD cryptanalysis of SASI All bits of except and MSBs are retrieved. Wrong guesses of k1 and k2 are detected due to the redundant equations (a filtering property  )

RD cryptanalysis of SASI

RD cryptanalysis of SASI Probability analysis. How many sessions are required for a reliable full disclosure attack?

RD cryptanalysis of SASI Comparison of theoretical and experimental probability of success

Attack summary Active (the attacker only blocks some messages) Probabilistic requires 13 authentication sessions (for more than 96% reliability) Full disclosure of all secrets

Attack summary Attack Type Assumption Ref. Full disclosure of all secrets Active , Probabilistic, An average of 240 sessions D’ Acro et al.(2011) Desynchronisation Active, Deterministic, An average of n/2 sessions Traceability Recovers the last bit of ID, advantage =1/4. Phan (2008) Active, , Deterministic, Three sessions, Sun et al. (2009) Full disclosure of ID Passive, Probabilistic, an average of 217 sessions Avoin et al. (2010) Active , Probabilistic, An average of 13 sessions Our attack

More Results

Conclusions Two frameworks for cryptanalysis of ULW protocols were proposed. keeping the previous state + exclusive use of T- functions (ARX schemes) is not recommended Use of lightweight primitives seems safer.

Thanks for your attentions