The distance-bounding protocol based on Russian cryptographic algorithms

被引:0
作者
Belsky, Vladimir [1 ]
Chichaeva, Anastasiia [1 ]
Shishkin, Vasily [1 ]
Tsaregorodtsev, Kirill [1 ]
机构
[1] JSRPC Kryptonite, Cryptog Lab, Moscow 115114, Russia
关键词
Distance-bounding; RFID; Authentication;
D O I
10.1007/s11416-024-00524-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In distance-bounding authentication protocols the Prover has to prove not only that it is a legitimate participant, but also that it is in a legitimate zone (e.g., in close proximity to the Verifier). Conventional authentication protocols are not designed to deal with the location of protocol parties. Using such protocols in case of RFID systems makes them vulnerable to simple relay attacks, which is a significant threat. Protocols that combine cryptographic mechanisms with technical measurements (e.g., time-of-flight or GPS location of the Prover) are often used to protect against relay attacks. In this paper we analyse existing distance-bounding authentication protocols and propose a new DB-RFID\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathsf {DB \text {-} RFID}$$\end{document} distance-bounding protocol for RFID systems. DB-RFID\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathsf {DB \text {-} RFID}$$\end{document} protocol develops the ideas of the most prominent Swiss-Knife protocol, which protects against a greater number of possible attacks. We also provide an initial security analysis of the protocol and propose a version of the protocol based on Russian standardized cryptographic algorithms.
引用
收藏
页码:485 / 495
页数:11
相关论文
共 41 条
[1]  
[Anonymous], 2018, 34132018 GOST
[2]  
[Anonymous], 2018, GOST 3411 2018
[3]  
[Anonymous], 2016, R 50 1 113 2016 INFO
[4]  
[Anonymous], 2017, 2916710 ISOIEC
[5]  
[Anonymous], 2018, GOST 3412 2018
[6]   A framework for analyzing RFID distance bounding protocols [J].
Avoine, Gildas ;
Bingol, Muhammed Ali ;
Kardas, Suleyman ;
Lauradoux, Cedric ;
Martin, Benjamin .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (02) :289-317
[7]  
Avoine G, 2011, WISEC 11: PROCEEDINGS OF THE FOURTH ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P145
[8]  
Avoine G, 2009, LECT NOTES COMPUT SC, V5735, P250, DOI 10.1007/978-3-642-04474-8_21
[9]  
Avoine Gildas., 2018, ACM Comput. Surv, V51, P1
[10]  
Bogdanov A, 2008, LECT NOTES COMPUT SC, V5154, P283