SECURITY ANALYSIS OF VARIOUS HASH ALGORITHMS FOR AUTHENTICATION UNDER HARDWARE CONSTRAINED ENVIRONMENT

  • Rashid Husain epartment of Mathematics and Computer Science, Sule Lamido University, Kafin Hausa, Jigawa State, Nigeria
  • Rabia Khan MCA,Punjab Technical University, India
  • Dr. Rajesh Kumar Tyagi Department of Computer Science, Amity University, Haryana, India
Keywords: Security Algorithms, Remote Keyless Entry System (RKES), Authentication Protocols, MAC, Hash Algorithms such as SHA, MD5

Abstract

Protecting passwords is now a big challenge because users want to do all types of work online via user-friendly devices such as mobile, tablets etc. Now, It is difficult to implement the secure heavy weight algorithms such as AES, RSA etc. in hardware constrained devices. It has been observed that users want all types of security services in an online public environment. Authentication is the first and foremost step to enhance security. Various applications are available for real time authentications such as keyless car entry and opening home-doors through security algorithms under remote keyless entry System (RKES). Now, it is the demand of the time to implement the lightweight security algorithms without compromising the security. In order to fulfill this challenge, this paper proposed a strong model for enhancing authentication security. In this work, strong authentication techniques are implemented with the light weight algorithms. This model received good comparison results.

Downloads

Download data is not yet available.

References

LASER: Lightweight And Secure Remote Keyless entry protocol: Vanesa Daza And Xavier Salleras(2019).

On the security of Remote Keyless Entry for vehicles: Jinita Patel Manik Lal Das sukumar nandi(2018).

A Protocol for Secure Remote Keyless Entry System Applicable in Vehicles using Symmetric –Key Cryptography: Tobias Glocker, Timo Mantere, Mohammad Elmusrati(2017).

Lock it and Still Lose It: On the security of automotive remote keyless entry systems: Flavio D.Garcia, David Oswald, Timo Kasper, Kasper & Oswald GmbH (2016).

Analysis Of Attack Against the Security Of Keyless Entry Systems for Vehicles and Suggestions for Improved Designs: Ansaf Ibrahem Alrabady and Syed Masud Mahumad(2005).

A. Moradi and T. Kasper,” A New Remote Keyless Entry System Resistant to Power Analysis Attacks” in ICICS, 2009 c IEEE. doi:10.1109/ICICS.2009.5397727 DOI: https://doi.org/10.1109/ICICS.2009.5397727

Alrabady and S. M. Mahmud,” Analysis of Attacks Against the Security of Keyless-Entry Systems for Vehicles and Suggestions for Improved Designs.” IEEE Trans. Veh. Technol., vol. 54, no. 1, Jan.2005. DOI: https://doi.org/10.1109/TVT.2004.838829

L. Vincent and G. Chevret,” Customer identification device, keyless access system for vehicle, vehicle sharing system including such a device and methods using such a device.” Patent WO2008044093 A1. Apr,17, 2008.

A. Bogdanov. Attacks on the KeeLoq Block Cipher and Authentication Systems. In RFIDSec 2007. http://rfidsec07.etsit.uma.es/slides/papers/paper- 22.pdf.

S. Chari, J. R. Rao, and P. Rohatgi. Template Attacks. In CHES 2002, volume 2523 of LNCS, pages 13–28. Springer, 2002. DOI: https://doi.org/10.1007/3-540-36400-5_3

N. T. Courtois, G. V. Bard, and D. Wagner. Algebraic and Slide Attacks on KeeLoq. In FSE 2008, volume 5086 of LNCS, pages 97– 115.Springer, 2008. DOI: https://doi.org/10.1007/978-3-540-71039-4_6

T. Eisenbarth, T. Kasper, A. Moradi, C. Paar, M. Salmasi Zadeh, and M. T. M. Shalmani. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. In CRYPTO 2008, volume 5157 of LNCS, pages 203–220. Springer, 2008 DOI: https://doi.org/10.1007/978-3-540-85174-5_12

H. Zhong, B. Huang, J. Cui, Y. Xu, and L. Liu, “Conditional privacy preserving authentication using registration list in vehicular ad hoc networks,” IEEE Access, vol. 6, pp. 2241–2250, 2018.

E. Hamdaqa, A. Mars, W. Adi, and S. Mulhem. Clone-resistant vehicular RKE by deploying SUC. In Proceedings of International Conference on Emerging Security Technologies, pp. 221-225, 2017. DOI: https://doi.org/10.1109/EST.2017.8090427

S. Indesteege, N. Keller, O. Dunkelman, E. Biham, and B. Preneel.A Practical Attack on KeeLoq. In Proceeding of the Theory and Applications of Cryptographic Techniques (EUROCRYPT), LNCS 4965, Springer-Verlag, pp. 1–18, 2008. DOI: https://doi.org/10.1007/978-3-540-78967-3_1

D. Rubino. How crooks can steal your car without the key. https://www.autocar.co.uk/car-news/industry/how-crooks-can- stealyourcar-without-key.15

Ibrahim, O. A., Hussain, A. M., Oligeri, G., and Di Pietro,R. (2018). Key is in the air: Hacking remote keyless entry systems. In Proc. of the International Workshop on Cyber Security for Intelligent Transportation Systems (CSIT 2018).

Kamkar, S. Drive It Like You Hacked It: New Attacks and Tools to Wirelessly Steal Cars. Presentation at DEFCON 23, August 2015.

C. Herder, M. Yu, F. Koushanfar, and S. Devadas. Physical Unclonable Functions and Applications: A Tutorial. In Proceedings of IEEE,102(8):1126–1141, 2014.

D. He, S. Zeadally, B. Xu, and X. Huang, “An efficient identity based conditional privacy-preserving authentication scheme for vehicular ad hoc networks,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 12, pp. 2681–2691, 2015.

D. Lee,” Keyless cars ’increasingly targeted by thieves using computers’.” Internet: www.bbc.com/news/technology-29786320, Oct. 2014 [Apr. 2,2016].

Cryptography and Network Security: Principles and Practice, by William Stallings. (3rd edition)

Published
2020-06-27
How to Cite
Husain, R., Khan , R., & Tyagi, R. K. (2020). SECURITY ANALYSIS OF VARIOUS HASH ALGORITHMS FOR AUTHENTICATION UNDER HARDWARE CONSTRAINED ENVIRONMENT. International Journal of Engineering Technologies and Management Research, 7(6), 131-140. https://doi.org/10.29121/ijetmr.v7.i6.2020.705