Analysis of block cipher modes of operation for rfid devices | Applied Discrete Mathematics. Supplement. 2020. № 13. DOI: 10.17223/2226308X/13/20

Analysis of block cipher modes of operation for rfid devices

The RFID system consists of radio-tag and interrogator. The main purpose of devices is authentication with a transmission of small amount of data between tag and interrogator. We study modes that require only block encryption to be implemented in the tag (due to hardware limitations). CTR, OFB and modified CBC modes were analyzed. Modified CBC mode CBC[F] can be specified as follows: Co = IV, Ci = Fk (Ci-1 e Mi), where Fk denotes either encryption (Fk = Ek) or decryption (Fk = E-1) of one block of data on the key k, Mi is the i-th block of plaintext, Ci is the i-th block of ciphertext, IV is an initialization vector. Assume that the length of the key is k bits, the length of the one block of data is n bits, and consider an adversary that runs time no more than t, makes no more than q oracle queries, each of length no more than m blocks. Then, given an oracle access to the CBC[Ek] and CbC = CBC[E-1] modes, the maximal advantage in the LOR-experiment can be bounded from above by: LOR LOR , 3q2m2 t + q AdvCBC,CBC (t,q,m) ^ 2n _ qm + 2-1 •

Download file
Counter downloads: 84

Keywords

доказуемая стойкость, RFID, режим шифрования, provable security, RFID, mode of operation

Authors

NameOrganizationE-mail
Tsaregorodtsev K. D.M. V. Lomonosov Moscow State University; NPK "Kryptonite"kirill94_12@mail.ru
Всего: 1

References

Katz J. and Lindell Y. Introduction to Modern Cryptography, 2nd Ed. Chapman & Hall/CRC, 2014.
Межгосударственный стандарт ГОСТ 34.13-2018 Информационная технология (ИТ). Криптографическая защита информации. Режимы работы блочных шифров. М.: Стан-дартинформ, 2018.
Ahmetzyanova L. R., Alekseev E. K., Oshkin I. B., et al. On the properties of the CTR encryption mode of Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing // Матем. вопр. криптогр. 2017. Т. 8. №2. С. 39-50.
Rogaway P. Evaluation of Some Block Cipher Modes of Operation. 2011. https://web.cs. ucdavis.edu/~rogaway/papers/modes.pdf
Wooding M. New Proofs for Old Modes. IACR Cryptology ePrint Archive. 2008.
Bellare M., Desai A., Jokipii E., and Rogaway P. A concrete security treatment of symmetric encryption // Proc. 38th Ann. Symp. Foundations of Computer Science, IEEE, 1997. P. 394-403.
 Analysis of block cipher modes of operation for rfid devices | Applied Discrete Mathematics. Supplement. 2020. № 13. DOI: 10.17223/2226308X/13/20

Analysis of block cipher modes of operation for rfid devices | Applied Discrete Mathematics. Supplement. 2020. № 13. DOI: 10.17223/2226308X/13/20

Download full-text version
Counter downloads: 461