Mokhtari Narges, Safari Amirhossein, Sadeghi Sadegh, Bagheri Nasour, Rostampour Samad, Bendavid Ygal
CPS2 Lab, Department of Communication, Faculty of Electrical Engineering, Shahid Rajaee Teacher Training University, Tehran, 16788-15811, Islamic Republic of Iran.
Department of Computer Science and Information Technology, Institute for Advanced Studies in Basic Sciences (IASBS), Zanjan, 45137-66731, Iran.
Sci Rep. 2025 May 12;15(1):16427. doi: 10.1038/s41598-025-01041-y.
The widespread adoption of IoT devices has made the production of low-cost systems a priority. Since construction costs are generally directly related to the complexity of security methods, researchers are exploring methods that provide acceptable security with minimal hardware complexity. One such method is the use of permutation functions in ultra-lightweight authentication protocols that employ simple operators such as XOR and Shift. This paper demonstrates the critical importance of the internal structure of a permutation function in ensuring system security. This implies that even if a protocol is designed securely and efficiently, structural weaknesses in the function can render the protocol vulnerable. To illustrate this, we examine a recently published protocol named ULBRAP for supply chain management systems and reveal its security flaws, including secret disclosure and traceability attacks. We also demonstrate the attack step-by-step on Raspberry Pi devices, publishing the details on GitHub and presenting them in a video. The attack method requires 1,710,947 hash calculations, which takes approximately 5 min in our experiments. Finally, we propose a solution to address the issues associated with these functions.
物联网设备的广泛应用使低成本系统的生产成为优先事项。由于建设成本通常与安全方法的复杂性直接相关,研究人员正在探索以最小硬件复杂性提供可接受安全性的方法。其中一种方法是在超轻量级认证协议中使用置换函数,该协议采用异或和移位等简单运算符。本文证明了置换函数的内部结构在确保系统安全方面的至关重要性。这意味着即使一个协议设计得安全且高效,函数中的结构弱点也可能使该协议变得脆弱。为了说明这一点,我们研究了最近发布的用于供应链管理系统的名为ULBRAP的协议,并揭示了其安全漏洞,包括秘密泄露和可追溯性攻击。我们还在树莓派设备上逐步演示了攻击过程,将详细信息发布在GitHub上并制作成视频展示。攻击方法需要1,710,947次哈希计算,在我们的实验中大约需要5分钟。最后,我们提出了一个解决方案来解决与这些函数相关的问题。