- freely available
EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen
AbstractThis paper analyzes the cryptographic security of J3Gen, a promising pseudo random number generator for low-cost passive Radio Frequency Identification (RFID) tags. Although J3Gen has been shown to fulfill the randomness criteria set by the EPCglobal Gen2 standard and is intended for security applications, we describe here two cryptanalytic attacks that question its security claims: (i) a probabilistic attack based on solving linear equation systems; and (ii) a deterministic attack based on the decimation of the output sequence. Numerical results, supported by simulations, show that for the specific recommended values of the configurable parameters, a low number of intercepted output bits are enough to break J3Gen. We then make some recommendations that address these issues.
Share & Cite This Article
Peinado, A.; Munilla, J.; Fúster-Sabater, A. EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen. Sensors 2014, 14, 6500-6515.View more citation formats
Peinado A, Munilla J, Fúster-Sabater A. EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen. Sensors. 2014; 14(4):6500-6515.Chicago/Turabian Style
Peinado, Alberto; Munilla, Jorge; Fúster-Sabater, Amparo. 2014. "EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen." Sensors 14, no. 4: 6500-6515.
Notes: Multiple requests from the same IP address are counted as one view.