Double Time-Memory Trade-Off in OSK RFID Protocol

被引:0
|
作者
Tomasevic, Violeta [1 ]
Tomasevic, Milo [2 ]
机构
[1] Singidunum Univ, Danijelova 32, Belgrade 11010, Serbia
[2] Univ Belgrade, Sch Elect Engn, Bul Kralja Aleksandra 73, Belgrade 11120, Serbia
关键词
RFID; OSK; Time-memory trade-off; Chaining; Hash functions; SECURITY; PRIVACY;
D O I
10.1007/s11277-019-06417-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The OSK/AO protocol has already demonstrated how the application of time-memory trade-off (TMTO) increases the efficiency of a hash chain-based RFID protocol. The complexity of this protocol, both in the preparatory phase and in the tag identification, is greatly influenced by chain generation procedure. Since the hash values in chain nodes are generated independently and randomly, the repetition of the same calculations impairs the protocol efficiency. This paper proposes an improved procedure for a faster chain generation by employing a special table with equidistant states from the tag state space. It provides that hash functions calculations for a node start not from the beginning but from a nearest state stored in the table. Consequently, the number of repeated hash calculations is significantly reduced. After the new OSK/TMTO2 protocol is precisely formalized, a complexity analysis is carried out with detailed consideration of two cases (with and without additional memory for the table). A comparison of the proposed protocol with OSK/AO is also conducted. The practical restrictions on configuration of an RFID system with the new protocol are stated as well. Finally, the conducted analysis is illustrated by numerous examples with wide spectrum of relevant parameter values.
引用
收藏
页码:551 / 568
页数:18
相关论文
共 28 条
  • [1] Double Time-Memory Trade-Off in OSK RFID Protocol
    Violeta Tomašević
    Milo Tomašević
    Wireless Personal Communications, 2019, 108 : 551 - 568
  • [2] Making a faster cryptanalytic time-memory trade-off
    Oechslin, P
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 617 - 630
  • [3] A Blocked Rainbow Table Time-Memory Trade-off Method
    Lu, Hongwei
    Zhu, Xiaoheng
    Gan, Zaobin
    2015 12TH WEB INFORMATION SYSTEM AND APPLICATION CONFERENCE (WISA), 2015, : 324 - 329
  • [4] A novel time-memory trade-off method for password recovery
    Thing, Vrizlynn L. L.
    Ying, Hwei-Ming
    DIGITAL INVESTIGATION, 2009, 6 : S114 - S120
  • [5] Cryptanalytic time-memory trade-off for password hashing schemes
    Chang, Donghoon
    Jati, Arpan
    Mishra, Sweta
    Sanadhya, Somitra Kumar
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (02) : 163 - 180
  • [6] Time-memory trade-off attack on FPGA platforms: UNIX password cracking
    Mentens, Nele
    Batina, Lejla
    Preneel, Bart
    Verbauwhede, Ingrid
    RECONFIGURABLE COMPUTING: ARCHITECTURES AND APPLICATIONS, 2006, 3985 : 323 - 334
  • [7] Characterization and improvement of time-memory trade-off based on perfect tables
    Avoine, Gildas
    Junod, Pascal
    Oechslin, Philippe
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (04)
  • [8] A time-memory trade-off approach for the solution of nonlinear equation systems
    Demirci, Huseyin
    Sagiroglu, Mahmut Samil
    Kulekci, Muhammed Oguzhan
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2013, 21 (01) : 186 - 197
  • [9] Making a Higher Hit Ratio Cryptanalytic Time-Memory Trade-Off Attack on Passwords
    Zou Jing
    Lin Dongdai
    Hao Chunhui
    Li Zhenqi
    Wang Wenhao
    Lu Yao
    CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (04): : 671 - 676
  • [10] Time-memory trade-off attacks on multiplications and T-functions
    Mitra, J
    Sarkar, P
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2004, PROCEEDINGS, 2004, 3329 : 468 - 482