Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/108080
Citations
Scopus Web of Science® Altmetric
?
?
Type: Conference paper
Title: Evaluation and cryptanalysis of the pandaka lightweight cipher
Author: Yarom, Y.
Li, G.
Ranasinghe, D.
Citation: Lecture Notes in Artificial Intelligence, 2015 / Malkin, T., Kolesnikov, V., Bishop Lewko, A., Polychronakis, M. (ed./s), vol.9092, pp.370-385
Publisher: Springer Verlag
Issue Date: 2015
Series/Report no.: LNCS
ISBN: 9783319281650
ISSN: 0302-9743
1611-3349
Conference Name: 13th International Conference Applied Cryptography and Network Security (ACNS) (2 Jun 2015 - 5 Jun 2015 : New York, NY)
Editor: Malkin, T.
Kolesnikov, V.
Bishop Lewko, A.
Polychronakis, M.
Statement of
Responsibility: 
Yuval Yarom, B, Gefei Li, and Damith C. Ranasinghe
Abstract: There is a growing need to develop lightweight cryptographic primitives suitable for resource-constrained devices permeating in increasing numbers into the fabric of life. Such devices are exemplified none more so than by batteryless radio frequency identification (RFID) tags in applications ranging from automatic identification and monitoring to anti-counterfeiting. Pandaka is a lightweight cipher together with a protocol proposed in INFOCOM 2014 for extremely resource limited RFID tags. It is designed to reduce the hardware cost (area of silicon) required for implementing the cipher by shifting the computationally intensive task of cryptographically secure random number generation to the reader. In this paper we evaluate Pandaka and demonstrate that the communication protocol contains flaws which completely undermine the security of the cipher and make Pandaka susceptible to de-synchronisation. Furthermore, we show that, even without the protocol flaws, we can use a guess and determine method to mount an attack on the cipher for the more challenging scenario of a known-plaintext attack with an expected complexity of only 255. We conclude that Pandaka needs to be amended and highlight simple measures to prevent the above attacks.
Description: LNCS, volume 9092
Rights: © Springer International Publishing Switzerland 2015
DOI: 10.1007/978-3-319-28166-7_18
Grant ID: http://purl.org/au-research/grants/arc/DP140103448
Published version: http://dx.doi.org/10.1007/978-3-319-28166-7_18
Appears in Collections:Aurora harvest 3
Computer Science publications

Files in This Item:
File Description SizeFormat 
RA_hdl_108080.pdf
  Restricted Access
Restricted Access295.31 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.