Fast Key Recovery Attack on ARMADILLO1 and Variants - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2011

Fast Key Recovery Attack on ARMADILLO1 and Variants

Pouyan Sepehrdad
  • Fonction : Auteur
  • PersonId : 1017806
Petr Sušil
  • Fonction : Auteur
  • PersonId : 1017807
Serge Vaudenay
  • Fonction : Auteur
  • PersonId : 1017808

Résumé

The ARMADILLO cryptographic primitive is a multi-purpose cryptographic primitive for RFID devices proposed at CHES’10. The main purpose of the primitive is to provide a secure authentication in a challenge-response protocol. It has two versions, named ARMADILLO (subsequently denoted by ARMADILLO1) and ARMADILLO2. However, we found a fatal weakness in the design which allows a passive attacker to recover the secret key in polynomial time, of ARMADILLO1 and some generalizations. We introduce some intermediate designs which try to prevent the attack and link ARMADILLO1 to ARMADILLO2. Considering the fact that the attack against ARMADILLO1 is polynomial, this brings about some concerns into the security of the second version ARMADILLO2, although it remains unbroken so far.
Fichier principal
Vignette du fichier
978-3-642-27257-8_9_Chapter.pdf (178.88 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01596306 , version 1 (27-09-2017)

Licence

Paternité

Identifiants

Citer

Pouyan Sepehrdad, Petr Sušil, Serge Vaudenay. Fast Key Recovery Attack on ARMADILLO1 and Variants. 10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.133-150, ⟨10.1007/978-3-642-27257-8_9⟩. ⟨hal-01596306⟩
488 Consultations
44 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More