EPCGen2 pseudorandom number generators: Analysis of J3Gen

21Citations
Citations of this article
32Readers
Mendeley users who have this article in their library.

Abstract

This paper analyzes the cryptographic security of J3Gen, a promising pseudo random number generator for low-cost passive Radio Frequency Identification (RFID) tags. Although J3Gen has been shown to fulfill the randomness criteria set by the EPCglobal Gen2 standard and is intended for security applications, we describe here two cryptanalytic attacks that question its security claims: (i) a probabilistic attack based on solving linear equation systems; and (ii) a deterministic attack based on the decimation of the output sequence. Numerical results, supported by simulations, show that for the specific recommended values of the configurable parameters, a low number of intercepted output bits are enough to break J3Gen. We then make some recommendations that address these issues. © 2014 by the authors; licensee MDPI, Basel, Switzerland.

Cite

CITATION STYLE

APA

Peinado, A., Munilla, J., & Fúster-Sabater, A. (2014). EPCGen2 pseudorandom number generators: Analysis of J3Gen. Sensors (Switzerland), 14(4), 6500–6515. https://doi.org/10.3390/s140406500

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free