Premium
A genetic tango attack against the David–Prasad RFID ultra‐lightweight authentication protocol
Author(s) -
Barrero David F.,
HernándezCastro Julio César,
PerisLopez Pedro,
Camacho David,
RMoreno María D.
Publication year - 2014
Publication title -
expert systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.365
H-Index - 38
eISSN - 1468-0394
pISSN - 0266-4720
DOI - 10.1111/j.1468-0394.2012.00652.x
Subject(s) - computer science , cryptanalysis , radio frequency identification , protocol (science) , computer security , context (archaeology) , authentication (law) , identification (biology) , genetic programming , authentication protocol , computer network , cryptography , artificial intelligence , medicine , paleontology , botany , alternative medicine , pathology , biology
Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging from the security point of view. Security protocols in RFID environments have to deal with strong computational limitations, and classical protocols cannot be used in this context. There have been several attempts to overcome these limitations in the form of new lightweight security protocols designed to be used in very constrained (sometimes called ultra‐lightweight) RFID environments. One of these proposals is the David–Prasad ultra‐lightweight authentication protocol. This protocol was successfully attacked using a cryptanalysis technique named Tango attack. The capacity of the attack depends on a set of boolean approximations. In this paper, we present an enhanced version of the Tango attack, named Genetic Tango attack, that uses Genetic Programming to design those approximations, easing the generation of automatic cryptanalysis and improving its power compared to a manually designed attack. Experimental results are given to illustrate the effectiveness of this new attack.