【24h】

Fast Software-Based Attacks on SecurID

机译:基于软件的SecurID攻击

获取原文

摘要

SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurID hash function [1]. They showed that vanishing differentials - collisions of the hash function - occur quite frequently, and that such differentials allow an attacker to recover the secret key in the token much faster than exhaustive search. Based on simulation results, they estimated that the running time of their attack would he about 2~(48) full hash operations when using only a single 2-bit vanishing differential. In this paper, we present techniques to improve the [1] attack. Our theoretical analysis and implementation experiments show that the running time of our improved attack is about 2~(45) hash operations. We then investigate into the use of extra information that an attacker would typically have: multiple vanishing differentials or knowledge that other vanishing differentials do not occur in a nearby time period. When using the extra information, we believe that key recovery can always be accomplished within about 2~(40) hash operations.
机译:SecurID是一种广泛使用的硬件令牌,可加强企业环境中的认证。最近,Biryukov,Lano和Preneel向涉嫌SecuriD哈希函数提出了攻击[1]。他们表明,消失的差异 - 哈希函数的碰撞 - 经常发生,并且这种差异允许攻击者在令牌中恢复令牌的秘密密钥比详尽的搜索快得多。根据仿真结果,他们估计,当仅使用单个2位消失差分时,他们的攻击的运行时间约为2〜(48)全哈希操作。在本文中,我们提出了改进[1]攻击的技术。我们的理论分析和实施实验表明,我们改善攻击的运行时间约为2〜(45)个哈希运营。然后,我们调查使用额外信息,即攻击者通常具有:在附近的时间段内不会发生其他消失差异的多次消失的差异或知识。使用额外信息时,我们认为始终可以在大约2〜(40)哈希操作之内完成键恢复。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号