Peinado Alberto, Munilla Jorge, Fúster-Sabater Amparo
Escuela Técnica Superior de Ingeniería de Telecomunicación, Universidad de Málaga, Málaga, Spain.
Instituto de Tecnologías Físicas y de la Información, Consejo Superior de Investigaciones Científicas, Madrid, Spain.
Sensors (Basel). 2014 Apr 9;14(4):6500-15. doi: 10.3390/s140406500.
This paper analyzes the cryptographic security of J3Gen, a promising pseudo random number generator for low-cost passive Radio Frequency Identification (RFID) tags. Although J3Gen has been shown to fulfill the randomness criteria set by the EPCglobal Gen2 standard and is intended for security applications, we describe here two cryptanalytic attacks that question its security claims: (i) a probabilistic attack based on solving linear equation systems; and (ii) a deterministic attack based on the decimation of the output sequence. Numerical results, supported by simulations, show that for the specific recommended values of the configurable parameters, a low number of intercepted output bits are enough to break J3Gen. We then make some recommendations that address these issues.
本文分析了J3Gen的加密安全性,J3Gen是一种用于低成本无源射频识别(RFID)标签的很有前景的伪随机数生成器。尽管J3Gen已被证明符合EPCglobal Gen2标准设定的随机性标准并适用于安全应用,但我们在此描述两种密码分析攻击,对其安全声明提出质疑:(i)基于求解线性方程组的概率攻击;(ii)基于输出序列抽取的确定性攻击。由模拟支持的数值结果表明,对于可配置参数的特定推荐值,只需少量截获的输出位就足以破解J3Gen。然后我们提出了一些解决这些问题的建议。