This paper analyzes the cryptographic security of J3Gen, a promising pseudo random number generator for low-cost passive Radio Frequency Identification (RFID) tags. Although J3Gen has been shown to fulfill the randomness criteria set by the EPCglobal Gen2 standard and is intended for security applications, we describe here two cryptanalytic attacks that question its security claims: (i) a probabilistic attack based on solving linear equation systems; and (ii) a deterministic attack based on the decimation of the output sequence. Numerical results, supported by simulations, show that for the specific recommended values of the configurable parameters, a low number of intercepted output bits are enough to break J3Gen. We then make some recommendations that address these issues. © 2014 by the authors; licensee MDPI, Basel, Switzerland.
CITATION STYLE
Peinado, A., Munilla, J., & Fúster-Sabater, A. (2014). EPCGen2 pseudorandom number generators: Analysis of J3Gen. Sensors (Switzerland), 14(4), 6500–6515. https://doi.org/10.3390/s140406500
Mendeley helps you to discover research relevant for your work.