• Aucun résultat trouvé

Secure Authentication

Dans le document Security and privacy in RFID systems (Page 111-114)

4.6 Security Analysis

4.6.1 Secure Authentication

Theorem 4.3. ROTIV ensures secure authentication under the resistance to existential forgery of MAC.

Proof. To simplify the proof, we assume that the key KT shared between a tag T and its owner is not updated after each successful authentication. As the key update is only required to achieve privacy and exclusive ownership, it is irrelevant for the authentication proof.

LetOMAC be an oracle that when queried with messagemreturnsσ =MACK(m), where K ∈Fq.

We show that if there is an adversaryAwho breaks the security ofROTIV’s authentica-tion with a non-negligible advantageǫ, then we can construct an adversaryBthat breaks the resistance to existential forgery of MAC (See Definition2.10) with a non-negligible advantage ǫ.

To break the resistance to existential forgery ofMAC, adversary Bsimulates challenger C and creates a complete ROTIV system as described in the following.

• B selects randomly x ∈Fq, and computes hx. Here, x is the secret key skI of issuer I and hx is the corresponding public keypkI.

• B selects η elements xk ∈Fq, and provides each owner in ROTIV with the secret key skk=xk and the matching public keypkk= (g,g˜k=gxk).

• To initialize the set of ntags in ROTIV, adversaryB proceeds as follows:

– B selects randomly IDi ∈ Fq,1 ≤ i ≤ n−1 and computes c0Ti = (1, H(IDi)skI).

Then, B selects randomly KTi ∈Fq and stores ST0i = (KTi, c0Ti) into Ti, 1 ≤ i ≤ n−1. Finally, Bcomputes Ti’s ownership referencesrefTi.

– ThenBcreates a tagTnwhose secret key isK. TagTnstores the stateST0n =c0Tn. Learning phase. Adversary Bsimulates challenger Cas depicted below:

• B simulatesOTag and returns r tags Ti to adversaryA, for whichA queries the oracle OExecute.

Note that if A selects tag Tn at this step of the game, then B simulates both tag Tn

and Tn’s ownerO(Tn,k) by querying the oracle OMAC.

• Again,B simulates oracle OTag in order to returnr additional tags Ti to adversary A. This time,A can read the internal states of tags Ti. We point out that if adversaryA selects tagTn at this step, thenB stops the authentication game.

4. RFID-BASED OWNERSHIP TRANSFER WITH ISSUER VERIFICATION

Challenge phase.

• In the challenge phase, adversary A selects a challenge tag Tc by querying the oracle OTag. IfTc 6=Tn, then Bstops the authentication game.

• Otherwise, adversaryAqueries the oracleOExecute with tagTc which starts aROTIV’s authentication.

1.) If A impersonates O(Tc,k), then A starts the authentication by sending a nonce NTj

c to Tc.

Bsimulates tagTc: he generates a random nonceRjT

c and queries the oracleOMAC

with messagem= (NTjc, RjTc, cjTc). The oracle OMAC returns σ=MACK(m), and B sendsRjT

c,cjT

c and σ to adversaryA. AdversaryA replies with (cj+1T

c , σc).

Since adversaryAhas a non-negligible advantageǫin impersonating ownerO(Tc,k), σc =MACK(mc), where mc = (RjT

c, cj+1T

c ). To break the resistance to existential forgery ofMACK, adversaryB outputs (mc, σc).

2.) IfA impersonatesTc, thenB sends a fresh nonceNTj

c to A. Upon receiving NTj

c, Agenerates a random numberRjTc and sendsRjTc, a ciphertextcjTc andσc to B. If adversary A has a non-negligible advantage ǫ in impersonating tag Tc, then σc =MACK(NTj

c, RjT

c, cjT

c).

Accordingly, to break the existential forgery of MACK,B outputs (mc, σc), where mc = (NTj

c, RjT

c, cjT

c).

Here we quantify the advantage ǫ of adversary B. Adversary B succeeds in breaking the resistance to existential forgery of MAC, if he does not stop the authentication game when simulating challengerC.

Let E denote the event: B does not stop the authentication game.

Let E1 denote the event: Bdoes not stop the authentication game in the learning phase.

LetE2 denote the event: Bdoes not stop the authentication game in the challenge phase.

Let pdenote the probability that A selects tag Tn.

Adversary B does not stop the authentication game in the learning phase, if and only if, adversary A does not pick tag Tn in the second phase of the learning phase. Consequently, P r(E1) = (1−p)r. Further,Bdoes not stop the authentication game in the challenge phase, if and only if, adversaryA selects tag Tn as his challenge tagTc. Thus,P r(E2) =p.

It follows that π =P r(E) =P r(E1)P r(E2) = (1−p)rp, and thatǫ =πǫ.

Therefore, if adversaryAhas a non-negligible advantageǫin breakingROTIV’s security, thenBwill have a non-negligible advantageǫ in breaking the resistance to existential forgery by making at most 4rs+ 1 queries to the oracle OMAC. This leads to a contradiction under the security of MAC.

88

4.6 Security Analysis Note thatπ is maximal whenp= 1

r and πmax = 1−1rr

r ≃ 1

er. 4.6.2 Exclusive Ownership

Theorem 4.4. ROTIV ensures exclusive ownership under the XDH assumption.

Proof. Assume there is an adversaryAwho succeeds in the exclusive ownership game with a non-negligible advantage ǫ. We show that there is an adversary B who uses adversary A to break the DDH assumption in G1 with a non-negligible advantageǫ.

To break the DDH assumption inG1, adversaryB proceeds as follows.

First,B simulates challengerCand creates a complete ROTIV system.

• B selects randomly skI ∈ Fq and computes pkI = hskI. Here skI is the secret key of issuer I and pkI is the corresponding public key.

• B selects randomly η random numbers xk ∈ Fq, and provides each owner Ok in the supply chain with a pair of matching public and secret keys pkk = (g,g˜k = gxk) and skk =xk.

• B creates ntagsTi.

Learning phase. Adversary Aenters the learning phase.

• B simulatesOTag and suppliesA withr tagsTi.

• Adversary A is allowed to run authentication sessions with tags Ti, to acquire their ownership and to transfer this ownership to owners of his choice.

Challenge phase.

• AdversaryB queries the oracle ODDH to receive (g, gx, gy, gz).

• In the challenge phase, B simulates OTag and provides A with a challenge tag Tc. Without loss of generality, we assume thatTc’s owner isOk.

Before giving the tag Tc to adversaryA, adversaryB encryptsTc’s signature usinggx from the DDH challenge:

cjTc = (ujTc, vjTc) = (gxr, H(IDc)skI(gxr)xk) = (gxr, H(IDc)skIxrk ) Wherer is a random number inFq.

• A now can read the internal state of tag Tc.

• A selects a challenge ownerOc, and transfers the ownership of tag Tc to Oc.

4. RFID-BASED OWNERSHIP TRANSFER WITH ISSUER VERIFICATION

If adversaryAhas a non-negligible advantageǫin breaking the exclusive ownership, then adversary A will be able to supply Oc during the ownership transfer protocol with correct ownership references:

refT = (S,id, Kold, Knew,randold,randnew) Wheree(gxr, h) =e(g,randnew), i.e.,randnew=hxr.

To break the DDH assumption, adversary Bverifies whether e(gz, hr) =e(gy,randnew) = e(gy, hxr). If so, Boutputsz=xy, otherwise, he outputs z6=xy.

As a result, if adversary A has a non-negligible advantage ǫ in breaking exclusive own-ership, then adversary B will have a non-negligible advantage ǫ = ǫ in breaking the DDH assumption.

Dans le document Security and privacy in RFID systems (Page 111-114)