Download now Free registration required
In this paper, the authors present a simple model for the automated cryptanalysis of cryptographic protocols based on meta-heuristic search. They illustrate their approach with a straightforward application in the form of an attack against a slightly simplified version of an ultra-lightweight authentication protocol for RFID environments called SASI. They show how an attack based on Simulated Annealing can efficiently recover the tag's secret ID, which is the value the protocol is designed to conceal.
- Format: PDF
- Size: 295.3 KB