首页> 外文期刊>The Computer journal >On Selecting the Nonce Length in Distance-Bounding Protocols
【24h】

On Selecting the Nonce Length in Distance-Bounding Protocols

机译:在距离限制协议中选择音调长度

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

Distance-bounding protocols form a family of challenge-response authentication protocols that have been introduced to thwart relay attacks. They enable a verifier to authenticate and to establish an upper bound on the physical distance to an untrusted proven We provide a detailed security analysis of a family of such protocols. More precisely, we show that the secret key shared between the verifier and the prover can be leaked after a number of nonce repetitions. The leakage probability, while exponentially decreasing with the nonce length, is only weakly dependent on the key length. Our main contribution is a high probability bound on the number of sessions required for the attacker to discover the secret, and an experimental analysis of the attack under noisy conditions. Both of these show that the attack's success probability mainly depends on the length of the used nonces rather than the length of the shared secret key. The theoretical bound could be used by practitioners to appropriately select their security parameters. While longer nonces can guard against this type of attack, we provide a possible countermeasure which successfully combats these attacks even when short nonces are used.
机译:距离限制协议形成了一系列挑战响应身份验证协议,这些协议已被引入以阻止中继攻击。它们使验证者可以进行身份​​验证,并建立与不受信任的经过验证的物理距离的上限。我们提供了此类协议系列的详细安全性分析。更准确地说,我们证明了在多次随机数重复之后,验证者和证明者之间共享的秘密密钥可能会泄露。尽管泄漏概率随随机数长度呈指数下降,但仅弱依赖于密钥长度。我们的主要贡献是,攻击者发现机密所需的会话数具有很高的概率,并在嘈杂的条件下对攻击进行了实验分析。这两个都表明,攻击的成功概率主要取决于所使用的随机数的长度,而不是共享密钥的长度。从业人员可以使用理论界限来适当选择其安全性参数。虽然较长的随机数可以防御此类攻击,但我们提供了一种可能的对策,即使使用短随机数也可以成功地抵抗这些攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号