a mp lfsr based pseudorandom number generator for epc
play

AMPLFSRbasedPseudorandom NumberGeneratorforEPCGen2Systems - PowerPoint PPT Presentation

AMPLFSRbasedPseudorandom NumberGeneratorforEPCGen2Systems Mitacs Workshop on Network Security & Cryptography Joaquin Garcia-Alfaro Institut TELECOM & UOC/IN3 Joint work with J.


  1. A
MP‐LFSR
based
Pseudorandom

 Number
Generator
for
EPC
Gen2
Systems
 Mitacs Workshop on Network Security & Cryptography 
 Joaquin Garcia-Alfaro Institut TELECOM & UOC/IN3 
 Joint work with J. Herrera-Joancomarti and J. Melia-Segui

  2. EPC: Electronic Product Code • Family of coding schemes to uniquely identify physical objects • Using RFID technology, it communicates a binary code ELECTRONIC PRODUCT CODE ELECTRONIC PRODUCT CODE 35 · 006A13A · 012B5F · 000034DA0 Header Manager number Manager number Object class Object class Serial number Serial number

  3. EPC Tags ELECTRONIC PRODUCT CODE ELECTRONIC PRODUCT CODE 35 · 006A13A · 012B5F · 000034DA0 Header Manager number Manager number Object class Object class Serial number Serial number • Passive tags (no battery onboard) • Memory and Power: - Very limited (less than 1024 bits of memory and 4µW) • Logic Circuitry: - Execution of queries, generation of pseudorandom sequences, and integrity checks (CRC).

  4. Gen2 vs. HF-based RFID Standards Research focused on low-cost RFID technologies:

  5. Motivation • Evaluation of PRNG designs for EPC Gen2 (Industry & Research) • Weaknesses of the Gen2 protocol if the PRNG output is predictable [WPC, 2010] A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags. Wireless Personal Communications , Springer, December 2010.

  6. Outline • Introduction • EPC Gen2 Protocol • LFSR-based PRNG proposals • Conclusion

  7. The EPC Gen2 Protocol [EPCGlobal, 2010]

  8. Select/Inventory Operation

  9. Access/Open Operation WRITE Command • After the selection process, the tag is individually identified • The tag generates several 16 bit nonce series (RN16), used for anti-collision & authentication • Handle (first RN16) is used to link the command session

  10. Outline • Introduction • EPC Gen2 Protocol • LFSR-based PRNG proposals • Conclusion

  11. LFSR-based PRNGs • Lightweight hardware implementation • LFSR already used for Gen2 CRC • Period of 2 n − 1 when the feedback polynomial is primitive

  12. LFSR linearity problem The feedback polynomial can be determined by simply eavesdropping 2n values

  13. Linearity Avoidance (1/2)

  14. Linearity Avoidance (1/2)

  15. Linearity Avoidance (2/2) [Che et al. , 2008] Networked RFID Systems and Lightweight Cryptography, Chapter 16, A Random Number Generator for Application in RFID Tags, pp. 279– 287. Springer, 2008.

  16. Evaluation of Each Proposal • Shrinking Generator: ~ 1435 GE, 517 clock cycles at 100KHz - EPC requires, at 100KHz, a RN16 in at most 220 cycles • Che et al. Scheme: ~ 500 GE, 50 clock cycles at 100KHz - However, predictable with Prob. ~ 1/2 for 160 bits [WLC, 2010] [WLC, 2010] Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags, Financial Cryptography and Data Security 2010 Workshops, LNCS, Springer, January, 2010.

  17. NIST Statistical analysis [WLC, 2010] Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags, Financial Cryptography and Data Security 2010 Workshops, LNCS, Springer, January, 2010.

  18. Expected Probability of Success [WLC, 2010] Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags, Financial Cryptography and Data Security 2010 Workshops, LNCS, Springer, January, 2010.

  19. Expected Probability of Success [WLC, 2010] Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags, Financial Cryptography and Data Security 2010 Workshops, LNCS, Springer, January, 2010.

  20. Probability of Success (4) Prob. that the remainder bits have been affected by exactly three trn Sequences divided as 2n + (n-1) (2) Probability that the two trn used in that sequence are exactly zeros (3) Probability that the (1) Given a sequence s , three trn used in that s.t. | s | = 2n , prob. that s sequence are exactly has been affected by zeros exactly two trn [WLC, 2010] Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags, Financial Cryptography and Data Security 2010 Workshops, LNCS, Springer, January, 2010.

  21. Testing the Attack (1/2)

  22. Testing the Attack (1/2) 43


  23. Testing the Attack (2/2) 128 bits

  24. Success Rate Analytical rate Empirical rate [WLC, 2010] Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags, Financial Cryptography and Data Security 2010 Workshops, LNCS, Springer, January, 2010.

  25. Success Rate [WLC, 2010] Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags, Financial Cryptography and Data Security 2010 Workshops, LNCS, Springer, January, 2010.

  26. Outline • Introduction • EPC Gen2 Protocol • LFSR-based PRNG proposals • Work-in-Progress • Conclusion

  27. Work-in-Progress 49


  28. Work-in-Progress Status 50


  29. Outline • Introduction • EPC Gen2 Protocol • LFSR-based PRNG proposals • Conclusion

  30. Conclusion

  31. Work-in-Progress Status

  32. A
MP‐LFSR
based
Pseudorandom

 Number
Generator
for
EPC
Gen2
Systems
 Mitacs Workshop on Network Security & Cryptography 
 


Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend