ML p(r)ior | On the security of the Algebraic Eraser tag authentication protocol

On the security of the Algebraic Eraser tag authentication protocol

2016-02-02
The Algebraic Eraser has been gaining prominence as SecureRF, the company commercializing the algorithm, increases its marketing reach. The scheme is claimed to be well-suited to IoT applications but a lack of detail in available documentation has hampered peer-review. Recently more details of the system have emerged after a tag authentication protocol built using the Algebraic Eraser was proposed for standardization in ISO/IEC SC31 and SecureRF provided an open public description of the protocol. In this paper we describe a range of attacks on this protocol that include very efficient and practical tag impersonation as well as partial, and total, tag secret key recovery. Most of these results have been practically verified, they contrast with the 80-bit security that is claimed for the protocol, and they emphasize the importance of independent public review for any cryptographic proposal.
PDF

Highlights - Most important sentences from the article

Login to like/save this paper, take notes and configure your recommendations

Related Articles

2018-11-20
1812.05454 | cs.CR

Post-Quantum Cryptography (PQC) attempts to find cryptographic protocols resistant to attacks using … show more
PDF

Highlights - Most important sentences from the article

2019-02-02
1902.00676 | cs.CR

Radio-frequency identification(RFID) technology is widely applied in daily human life. The RFID card… show more
PDF

Highlights - Most important sentences from the article

2019-03-25

Quantum key distribution (QKD) enables unconditionally secure communication between distinct parties… show more
PDF

Highlights - Most important sentences from the article

2018-12-12

In this paper, we suggest a code-based public key encryption scheme, called McNie. McNie is a hybrid… show more
PDF

Highlights - Most important sentences from the article

2017-11-13

Joint encryption-encoding schemes have been released to fulfill both reliability and security desire… show more
PDF

Highlights - Most important sentences from the article

2019-04-26
1904.11785 | cs.IT

It was recently proved that twisted Reed--Solomon codes represent a family of codes which contain a … show more
PDF

Highlights - Most important sentences from the article

2019-04-09

In this paper, we have proposed a multi factor biometric-based remote authentication protocol. Our p… show more
PDF

Highlights - Most important sentences from the article

2018-06-27

Mobile communication networks connect much of the world's population. The security of users' calls, … show more
PDF

Highlights - Most important sentences from the article

2019-03-13
1903.05436 | cs.IT

In this paper, we study the security of a compressed sensing (CS) based cryptosystem called a sparse… show more
PDF

Highlights - Most important sentences from the article

2019-03-06

Efficient authentication is vital for IoT applications with stringent minimum-delay requirements (e.… show more
PDF

Highlights - Most important sentences from the article

2018-07-16

In this paper we consider a post-quantum digital signature scheme based on low-density generator mat… show more
PDF

Highlights - Most important sentences from the article

2018-09-09

In this paper, a code-based public-key cryptosystem based on interleaved Goppa codes is presented. T… show more
PDF

Highlights - Most important sentences from the article

2018-10-11
1810.05234 | quant-ph

In this paper, we construct a new scheme for delegating a large circuit family, which we call "C+P c… show more
PDF

Highlights - Most important sentences from the article

2018-04-28
1805.00337 | cs.CR

We have formerly introduced Deep Random Secrecy, a new cryptologic technique capable to ensure secre… show more
PDF

Highlights - Most important sentences from the article

2018-12-12

McNie is a code-based public key encryption scheme submitted as a candidate to the NIST Post-Quantum… show more
PDF

Highlights - Most important sentences from the article

2018-12-12

A repair of the Faure-Loidreau (FL) public-key code-based cryptosystem is proposed. The FL cryptosys… show more
PDF

Highlights - Most important sentences from the article