Abstract
In this paper, we focus on Gossamer, a well-known ultralightweight authentication protocol, introduced in 2008. Our contributions are the following:
-
we analyze the structure of the MixBits function, a key component of the protocol, and show that it does not realize a pseudorandom function, not even in a weak form;
-
we show, by employing artificial intelligence techniques, that tags are distinguishable;
-
finally, we study the performance of Gossamer and show that it does not provide a substantial saving, compared to a standard three-round mutual authentication protocol, implemented with lightweight primitives.
We close the paper with further comments and remarks.












Similar content being viewed by others
Availability of data and materials
Not applicable.
Notes
www.rapidminer.com.
For readers interested in the details and with background in the area, each sub-network consists of a sequence of convolutional layers, each of which uses a single channel, with filters and kernels of varying size. The number of convolutional filters is specified as a multiple of 16, to get advantage of the GPU capabilities. The network applies a ReLU activation function to the output feature maps, optionally followed by a one-dimensional max-pooling layer. The units in the final convolutional layer are flattened into a single vector. This convolutional layer is followed by a fully-connected layer and, then, one more layer, computing the induced distance metric between each siamese sub-network, which is given to a single sigmoidal output unit.
Such a standard modeling is, of course, highly demanding, and in some applications it might be more than strictly needed. But, as widely agreed within the community, achieving such a notion, enables a safe use of the protocol in any application.
We point out that we tried also with standard classifiers obtaining results supersided by the Siamese network.
Notice that even percentages close to 0.5 could yield some advantages to a distinguisher. However, the bigger the accuracy the stronger is the attack.
Notice that, we are assuming implicitly that \({\mathcal {A}}\) can send an oracle query in each execution step. Perhaps, we could be successful also with a smaller number of oracle queries, but we did not care about possible optimizations, since our goal was only to show that the approach works.
References
Ahmed, E.G., Shaaban, E., Hashem, M.: Lightweight mutual authentication protocol for low cost RFID tags. arXiv:1005.4499 (2010)
Alani, M.M.: Neuro-cryptanalysis of des and triple-des. In: Huang, T., Zeng, Z., Li, C., Leung, C.S. (eds.) Neural Information Processing, pp. 637–646. Springer, Berlin (2012)
Avoine, G., Carpent, X., Hernandez-Castro, J.: Pitfalls in ultralightweight authentication protocol designs. IEEE Trans. Mob. Comput. 15(9), 2317–2332 (2015)
Avoine, G., Carpent, X., Martin, B.: Strong authentication and strong integrity (sasi) is not that strong. In: International Workshop on Radio Frequency Identification: Security and Privacy Issues, pp. 50–64. Springer (2010)
Azraoui, M., Bahram, M., Bozdemir, B., Canard, S., Ciceri, E., Ermis, O., Masalha, R., Mosconi, M., Önen, M., Paindavoine, M., Rozenberg, B., Vialla, B., Vicini, S.: SoK: Cryptography for Neural Networks, pp. 63–81. Springer, Cham (2020)
Bilal, Z., Martin, K.: Ultra-lightweight mutual authentication protocols: weaknesses and countermeasures. In: 2013 International Conference on Availability, Reliability and Security, pp. 304–309. IEEE (2013)
Bilal, Z., Masood, A., Kausar, F.: Security analysis of ultra-lightweight cryptographic protocol for low-cost rfid tags: Gossamer protocol. In: 2009 International Conference on Network-Based Information Systems, pp. 260–267. IEEE (2009)
Bromley, J., Guyon, I., LeCun, Y., Säckinger, E., Shah, R.: Signature verification using a siamese time delay neural network. Adv. Neural Inf. Process. Syst. 6, 737–744 (1993)
Carpent, X., DArco, P., De Prisco, R.: Ultralightweight authentication protocols. Selected Topics in Security of Ubiquitous Computing Systems (2019). ISBN: 978-3-030-10591-4
Chicco, D.: Siamese neural networks: an overview. Artif. Neural Netw., pp. 73–94 (2021)
Chien, H.Y.: SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secure Comput. 4(4), 337–340 (2007)
Cooperation, A.: 8-bit AVR microcontroller with 128k bytes in-system programmable flash (2007)
DArco, P.: Ultralightweight cryptography. In: International Conference on Security for Information Technology and Communications, pp. 1–16. Springer (2018)
DArco, P., De Prisco, R.: Design weaknesses in recent ultralightweight RFID authentication protocols. In: IFIP International Conference on ICT Systems Security and Privacy Protection, pp. 3–17. Springer (2018)
DArco, P., De Santis, A.: Weaknesses in a recent ultra-lightweight RFID authentication protocol. In: International Conference on Cryptology in Africa, pp. 27–39. Springer (2008)
DArco, P., De Santis, A.: On ultralightweight RFID authentication protocols. IEEE Trans. Dependable Secure Comput. 8(4), 548–563 (2010)
Fan, F., Wang, G.: Learning from pseudo-randomness with an artificial neural network? Does god play pseudo-dice? IEEE Access 6, 22987–22992 (2018). https://doi.org/10.1109/ACCESS.2018.2826448
Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda-Garnacho, A., Ramos-Alvarez, B.: Wheedham: an automatically designed block cipher by means of genetic programming. In: 2006 IEEE International Conference on Evolutionary Computation, pp. 192–199. IEEE (2006)
Hernandez-Castro, J.C., Tapiador, J.M., Peris-Lopez, P., Quisquater, J.J.: Cryptanalysis of the SASI ultralightweight RFID authentication protocol with modular rotations. arXiv:0811.4257 (2008)
Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Annual International Cryptology Conference, pp. 293–308. Springer (2005)
Kanter, I., Kinzel, W., Kanter, E.: Secure exchange of information by synchronization of neural networks. Europhys. Lett. (EPL) 57(1), 141–147 (2002)
Karras, D., Zorkadis, V.: Strong pseudorandom bit sequence generators using neural network techniques and their evaluation for secure communications. In: McKay, B., Slaney, J. (eds.) AI 2002: Advances in Artificial Intelligence, pp. 615–626. Springer, Berlin (2002)
Katz, J., Lindell, Y.: Introduction to Modern Cryptography. CRC Press, Boca Raton (2021)
Klimov, A., Mityagin, A., Shamir, A.: Analysis of neural cryptography. In: Zheng, Y. (ed.) Advances in Cryptology—ASIACRYPT 2002, pp. 288–298. Springer, Berlin (2002)
Koch, G., Zemel, R., Salakhutdinov, R.: Siamese neural networks for one-shot image recognition. In: ICML Deep Learning Workshop, vol. 2. Lille (2015)
Kotu, V., Deshpande, B.: Predictive Analytics and Data Mining: Concepts and Practice with Rapidminer. Morgan Kaufmann, Burlington (2014)
Orlandi, C., Piva, A., Barni, M.: Oblivious neural network computing via homomorphic encryption. EURASIP J. Inf. Secur. (037343) (2007)
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Emap: an efficient mutual-authentication protocol for low-cost RFID tags. In: OTM Confederated International Conferences “On the Move to Meaningful Internet Systems”, pp. 352–361. Springer (2006)
Peris-Lopez, P., Hernandez-Castro, J.C., Estévez-Tapiador, J.M., Ribagorda, A.: Lmap: a real lightweight mutual authentication protocol for low-cost RFID tags. In: Proc. of 2nd Workshop on RFID Security, vol. 6 (2006)
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: M 2 ap: a minimalist mutual-authentication protocol for low-cost RFID tags. In: International Conference on Ubiquitous Intelligence and Computing, pp. 912–923. Springer (2006)
Peris-Lopez, P., Hernandez-Castro, J.C., Tapiador, J.M., Ribagorda, A.: Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol. In: International Workshop on Information Security Applications, pp. 56–68. Springer (2008)
Phan, R.C.W.: Cryptanalysis of a new ultralightweight RFID authentication protocol-SASI. IEEE Trans. Dependable Secure Comput. 6(4), 316–320 (2008)
Pinkas, B.: Cryptographic techniques for privacy-preserving data mining. ACM Sigkdd Explor. Newsl. 4(2), 12–19 (2002). https://doi.org/10.1145/772862.772865
Rama, N., Suganya, R.: Ssl-map: a more secure gossamer-based mutual authentication protocol for passive RFID tags. Int. J. Comput. Sci. Eng. 2, 363–367 (2010)
Rivest, R.L.: Cryptography and machine learning. In: H. Imai, R.L. Rivest, T. Matsumoto (eds.) Advances in Cryptography—ASIACRYPT ’91, Lecture Notes in Computer Science, vol. 739, pp. 427–439. Springer
Sun, H.M., Ting, W.C., Wang, K.H.: On the security of Chiens ultralightweight RFID authentication protocol. IEEE Trans. Dependable Secure Comput. 8(2), 315–317 (2009)
Tagra, D., Rahman, M., Sampalli, S.: Technique for preventing dos attacks on RFID systems. In: SoftCOM 2010, 18th International Conference on Software, Telecommunications and Computer Networks, pp. 6–10. IEEE (2010)
Van Deursen, T., Radomirovic, S.: Attacks on RFID protocols. IACR Cryptol. ePrint Arch. 2008(310), 1–56 (2008)
Vaudenay, S.: On privacy models for RFID. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 68–87. Springer (2007)
Yeh, K.H., Lo, N.: Improvement of two lightweight RFID authentication protocols. Inf. Assur. Secur. Lett. 1(1), 6–11 (2010)
Acknowledgements
We would like to thank Dr. Laura Zollo for helping us, in a preliminary version of this work, during her final-degree project for the Master Program in Computer Science (Laurea Magistrale in Informatica). Moreover, we are grateful to two anonymous referees for comments and suggestions, which helped us to significantly improve the quality of the paper.
Funding
Not applicable. This research has been carried out by the authors as part of their normal duties as professors/students.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest/Competing interests.
The authors declare that there are no conflict of interest nor competing interests.
Research involving human participants and/or animals
This article does not contain any studies with human participants or animals performed by any of the authors.
Informed consent
Not applicable.
Code availability
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
D’Arco, P., De Prisco, R., Ansaroudi, Z.E. et al. Gossamer: weaknesses and performance. Int. J. Inf. Secur. 21, 669–687 (2022). https://doi.org/10.1007/s10207-021-00575-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-021-00575-2