On Selecting the Nonce Length in Distance-Bounding Protocols

作者: A. Mitrokotsa , P. Peris-Lopez , C. Dimitrakakis , S. Vaudenay

DOI: 10.1093/COMJNL/BXT033

关键词:

摘要: Distance-bounding protocols form a family of challenge–response authentication that have been introduced to thwart relay attacks. They enable verifier authenticate and establish an upper bound on the physical distance an untrusted prover.We provide detailed security analysis of such protocols. More precisely, we show secret key shared between verifier and prover can be leaked after number nonce repetitions. The leakage probability, while exponentially decreasing with length, is only weakly dependent length. Our main contribution high probability sessions required for attacker to discover secret, experimental analysis attack under noisy conditions. Both these show attack’s success mainly depends length used nonces rather than key. theoretical could by practitioners to appropriately select their parameters. While longer guard against this type of attack, possible countermeasure which successfully combats these attacks even when short are

参考文章(23)
Stefan Brands, David Chaum, Distance-bounding protocols theory and application of cryptographic techniques. pp. 344- 359 ,(1994) , 10.1007/3-540-48285-7_30
Mohammad Reza Sohizadeh Abyaneh, Security analysis of two distance-bounding protocols international conference on rfid. pp. 94- 107 ,(2011) , 10.1007/978-3-642-25286-0_7
Chong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, Olivier Pereira, The Swiss-Knife RFID Distance Bounding Protocol international conference on information security and cryptology. pp. 98- 115 ,(2009) , 10.1007/978-3-642-00730-9_7
Jean-Philippe Aumasson, Aikaterini Mitrokotsa, Pedro Peris-Lopez, A note on a privacy-preserving distance-bounding protocol international conference on information and communication security. ,vol. 7043, pp. 78- 92 ,(2011) , 10.1007/978-3-642-25243-3_7
Alberto Peinado, Jorge Munilla, Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels communications and mobile computing. ,vol. 8, pp. 1227- 1232 ,(2008) , 10.1002/WCM.V8:9
Kazuoki Azuma, Weighted sums of certain dependent random variables Tohoku Mathematical Journal. ,vol. 19, pp. 357- 367 ,(1967) , 10.2748/TMJ/1178243286
Gildas Avoine, Cédric Lauradoux, Benjamin Martin, How secret-sharing can defeat terrorist fraud Proceedings of the fourth ACM conference on Wireless network security - WiSec '11. pp. 145- 156 ,(2011) , 10.1145/1998412.1998437
K. SUZUKI, D. TONIEN, K. KUROSAWA, K. TOYOTA, Birthday Paradox for Multi-Collisions IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. ,vol. 91, pp. 39- 45 ,(2008) , 10.1093/IETFEC/E91-A.1.39
Aikaterini Mitrokotsa, Cristina Onete, Serge Vaudenay, Mafia fraud attack against the RČ Distance-Bounding Protocol international conference on rfid. pp. 74- 79 ,(2012) , 10.1109/RFID-TA.2012.6404571
Jason Reid, Juan M. Gonzalez Nieto, Tee Tang, Bouchra Senadji, Detecting relay attacks with timing-based protocols Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07. pp. 204- 213 ,(2007) , 10.1145/1229285.1229314