Question
Recall the concept of Physically Unclonable Functions, which are an important
component of hardware based security. Here is a simple scenario and simple protocol using
PUFs for authenticating a tag. In the protocol below, the Reader stores ALL possible
combinations of Challenge-Response pairs for every tag it needs to authenticate. During
authentication, the Reader broadcasts the ID of the tag, and a greeting (Gn ). Every tag may
see this message, but only the one with the right ID will process the message. The right tag
with the ID in the message will then feed the greeting to its PUF and compute the response
Sn. The response is then sent to the Reader. This should be clear from the Figure below. For
the next round of authenticating the same Tag, the process repeats with a new Greeting
(G n+1 ). Since the Reader has the responses, authentication is straightforward. Recall that
Challenges and Responses are typically 128 or 256 bit strings for RFIDs.
From the protocol, and class, it should be clear that eavesdropping attacks are ineffective in
this protocol, since the attacker will be able to snoop on challenge response pairs for one
round. But this pair will not be used again, attackers gain no practical advantage. Also, since
the PUF is not cloneable, attackers will not be able to generate the response expected. This
much should be clear. I agree that the Tag ID is sent in plaintext. Let us assume that privacy
of the tag being searched is not a requirement (to keep it simple).
Give one or two reasons as to why you will NOT recommend this protocol if you are in-charge
of securing RFID tags. Do not mention Plain Text Response, Replay Attacks, Man in the
Middle and Jamming attacks. These attacks are a problem, but I am looking for more
problems, and importantly, problems unique to this protocol compared to what we saw in
class. Please think carefully. Be as descriptive as possible. If you see multiple problems, write
and describe them also.
The conclusions you draw will ideally be general enough to apply to many challenge-
response based securitymechanisms.
component of hardware based security. Here is a simple scenario and simple protocol using
PUFs for authenticating a tag. In the protocol below, the Reader stores ALL possible
combinations of Challenge-Response pairs for every tag it needs to authenticate. During
authentication, the Reader broadcasts the ID of the tag, and a greeting (Gn ). Every tag may
see this message, but only the one with the right ID will process the message. The right tag
with the ID in the message will then feed the greeting to its PUF and compute the response
Sn. The response is then sent to the Reader. This should be clear from the Figure below. For
the next round of authenticating the same Tag, the process repeats with a new Greeting
(G n+1 ). Since the Reader has the responses, authentication is straightforward. Recall that
Challenges and Responses are typically 128 or 256 bit strings for RFIDs.
From the protocol, and class, it should be clear that eavesdropping attacks are ineffective in
this protocol, since the attacker will be able to snoop on challenge response pairs for one
round. But this pair will not be used again, attackers gain no practical advantage. Also, since
the PUF is not cloneable, attackers will not be able to generate the response expected. This
much should be clear. I agree that the Tag ID is sent in plaintext. Let us assume that privacy
of the tag being searched is not a requirement (to keep it simple).
Give one or two reasons as to why you will NOT recommend this protocol if you are in-charge
of securing RFID tags. Do not mention Plain Text Response, Replay Attacks, Man in the
Middle and Jamming attacks. These attacks are a problem, but I am looking for more
problems, and importantly, problems unique to this protocol compared to what we saw in
class. Please think carefully. Be as descriptive as possible. If you see multiple problems, write
and describe them also.
The conclusions you draw will ideally be general enough to apply to many challenge-
response based security
SAVE
AI-Generated Solution
info
AI-generated content may present inaccurate or offensive content that does not represent bartleby’s views.
Unlock instant AI solutions
Tap the button
to generate a solution
to generate a solution
Click the button to generate
a solution
a solution
Knowledge Booster
Similar questions
- For now, we're making do with a rudimentary hash map in which all the values are stored in a single bucket (that is, they are all in the same LinkedList). Once a hash map's goal is met, it is considered successful.arrow_forwardThe values have been put into a single pool, and a hash map that was not constructed with much care has resulted (that is, they are all in the same LinkedList). Give a justification for why this is counterproductive to using a hash map.arrow_forwarddef mystery (1st); for idx in range(1, len(1st)); tmp = 1st[idx) idx2 = idx while 1dx2 > 9 and 1st[idx2-11 tmp: 1st[idx2] 1st[10/2 - 11 1dx2 = 1dx2 - 1 1st[idx2] = tmp print(1st) a. If we call this function as follows: mystery(lt) where ist 15, 2, 8, 11, what is printed out t clear about what is printed out, don't make me try to figure it out). b. What does this function do? c. What is the complexity of this function? Oni Ora, On³ Ologinil, Onioginil? Explain your reasoningarrow_forward
- We're using a rudimentary hash map in which all the keys and values are stored in the same LinkedList, which is inefficient. Hash maps have successfully fulfilled their intended purpose.arrow_forwardFor the word count example, for the input of the Map function, keys are document IDs and values are document contents. For the output of the Map function, keys are words and values are counts of words (e.g., (a, 1)). After shuffling via a hashing function on keys of the output, we combine those values with the same key into a list, for example, (a, {1, 5}), which are used as the input of the Reduce function. Within the reduce function, it will count (sum up) the numbers in the value list of a key, and return the key/value pair (e.g., (a, 6)). How to Implement the WordCount example on Hadoop?arrow_forwardWe have a hash map that wasn't made very well since all the values were dumped into the same bucket (that is, they are all in the same LinkedList). Explain why employing a hash map in the first place would be defeated by this, if that is the case.arrow_forward
- Briefly explain what Side Channel Attacks are. Explain in simple terms, at-leastthree different types of information that can enable hardware based side channel attacks. AreSide Channel attacks active or passive in general? Justify your answerarrow_forwardDefine lexeme and token. For the code segment below, identify and list all lexemes. How many unique lexemes are there? For the same code segment below, identity and list all unique tokens. How many unique tokens are there? while (fahr <= upper) { tempInC = (fahr 32) * 5/9; print tempInC; fahr = fahr + 1; print "Done!"arrow_forwardWe have an incorrectly created hash map, with all of the values put in the same bucket (that is, they are all in the same LinkedList). Explain why this is a breach of the original goal of the hash map and why it should be avoided.arrow_forward
- Our hash map wasn't correctly formed since all the data were in one bucket (that is, they are all in the same LinkedList). Explain why this would defeat the purpose of a hash map.arrow_forwardAll the values were thrown into the same hash bucket, therefore the hash map isn't particularly good (that is, they are all in the same LinkedList). If this is the case, please elaborate on how using a hash map in the first place will be rendered ineffective.arrow_forwardHowever, our hash map was poorly constructed, so all of the values are now in the same pile (that is, they are all in the same LinkedList). To what extent does this defeat the purpose of a hash map, please explain.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios