EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen
AbstractThis paper analyzes the cryptographic security of J3Gen, a promising pseudo random number generator for low-cost passive Radio Frequency Identification (RFID) tags. Although J3Gen has been shown to fulfill the randomness criteria set by the EPCglobal Gen2 standard and is intended for security applications, we describe here two cryptanalytic attacks that question its security claims: (i) a probabilistic attack based on solving linear equation systems; and (ii) a deterministic attack based on the decimation of the output sequence. Numerical results, supported by simulations, show that for the specific recommended values of the configurable parameters, a low number of intercepted output bits are enough to break J3Gen. We then make some recommendations that address these issues. View Full-Text
Scifeed alert for new publicationsNever miss any articles matching your research from any publisher
- Get alerts for new papers matching your research
- Find out the new papers from selected authors
- Updated daily for 49'000+ journals and 6000+ publishers
- Define your Scifeed now
Peinado, A.; Munilla, J.; Fúster-Sabater, A. EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen. Sensors 2014, 14, 6500-6515.
Peinado A, Munilla J, Fúster-Sabater A. EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen. Sensors. 2014; 14(4):6500-6515.Chicago/Turabian Style
Peinado, Alberto; Munilla, Jorge; Fúster-Sabater, Amparo. 2014. "EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen." Sensors 14, no. 4: 6500-6515.