Empreu aquest identificador per citar o enllaçar aquest ítem:
http://hdl.handle.net/10609/109802
Registre complet de metadades
Camp DC | Valor | Llengua/Idioma |
---|---|---|
dc.contributor.author | Melià-Seguí, Joan | - |
dc.contributor.author | Garcia-Alfaro, Joaquin | - |
dc.contributor.author | Herrera-Joancomartí, Jordi | - |
dc.contributor.other | Universitat Oberta de Catalunya. Internet Interdisciplinary Institute (IN3) | - |
dc.contributor.other | Institut Mines-Télécom | - |
dc.contributor.other | Universitat Autònoma de Barcelona (UAB) | - |
dc.date.accessioned | 2020-02-18T08:23:46Z | - |
dc.date.available | 2020-02-18T08:23:46Z | - |
dc.date.issued | 2010-11-26 | - |
dc.identifier.citation | Melià Seguí, J., García Alfaro, J. & Herrera-Joancomartí, J. (2011). A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags. Wireless Personal Communications, 59(1), 27-42. doi: 10.1007/s11277-010-0187-1 | es |
dc.identifier.issn | 0929-6212MIAR | - |
dc.identifier.uri | http://hdl.handle.net/10609/109802 | - |
dc.description.abstract | The Electronic Product Code Generation 2 (EPC Gen2) is an international standard that proposes the use of Radio Frequency Identification (RFID) in the supply chain. It is designed to balance cost and functionality. As a consequence, security on board of EPC Gen2 tags is often minimal. It is, indeed, mainly based on the use of on board pseudorandomness, used to obscure the communication between readers and tags; and to acknowledge the proper execution of password-protected operations. In this paper, we present a practical implementation attack on a weak pseudorandom number generator (PRNG) designed specifically for EPC Gen2 tags. We show that it is feasible to eavesdrop a small amount of pseudorandom values by using standard EPC commands and using them to determine the PRNG configuration that allows to predict the complete output sequence. | en |
dc.format.mimetype | application/pdf | - |
dc.language.iso | eng | - |
dc.publisher | Wireless Personal Communications | - |
dc.relation.ispartof | Wireless Personal Communications, 2011, 59(1) | - |
dc.relation.uri | https://doi.org/10.1007/s11277-010-0187-1 | - |
dc.rights | CC BY-NC-ND | - |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ | - |
dc.subject | RFID | en |
dc.subject | EPC Gen2 | en |
dc.subject | PRNG | en |
dc.subject | security | en |
dc.subject | eavesdropping | en |
dc.subject | attack | en |
dc.subject | implementation | en |
dc.subject | RFID | ca |
dc.subject | RFID | es |
dc.subject | EPC Gen2 | ca |
dc.subject | EPC Gen2 | es |
dc.subject | PRNG | ca |
dc.subject | PRNG | es |
dc.subject | seguretat | ca |
dc.subject | seguridad | es |
dc.subject | espionatge | ca |
dc.subject | espionaje | es |
dc.subject | atac | ca |
dc.subject | ataque | es |
dc.subject | implementació | ca |
dc.subject | implementación | es |
dc.subject.lcsh | Computer security | en |
dc.title | A practical implementation attack on weak pseudorandom number generator designs for EPC Gen2 tags | - |
dc.type | info:eu-repo/semantics/article | - |
dc.subject.lemac | Seguretat informàtica | ca |
dc.subject.lcshes | Seguridad informática | es |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | - |
dc.identifier.doi | 10.1007/s11277-010-0187-1 | - |
dc.gir.id | AR/0000002332 | - |
dc.relation.projectID | info:eu-repo/grantAgreement/CONSOLIDER CSD2007-00004 ARES | - |
dc.relation.projectID | info:eu-repo/grantAgreement/TSI2007-65406-C03-03 E-AEGIS | - |
dc.type.version | info:eu-repo/semantics/acceptedVersion | - |
Apareix a les col·leccions: | Articles cientÍfics Articles |
Arxius per aquest ítem:
Arxiu | Descripció | Mida | Format | |
---|---|---|---|---|
Melia_Garcia_Herrera_WPC_2010_post.pdf | Post-print | 280,73 kB | Adobe PDF | Veure/Obrir |
Comparteix:
Aquest ítem està subjecte a una llicència de Creative Commons Llicència Creative Commons