首页> 外文OA文献 >Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks
【2h】

Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks

机译:计数仍然计数吗?再次探讨基于计数的用户身份验证协议针对统计攻击的安全性

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions.ududIn this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.
机译:在NDSS 2012上,Yan等人。分析了几种针对被动观察者的质询-响应类型的用户身份验证协议的安全性,并提出了一种基于计数的统计攻击,以在给定多个观察身份验证会话的情况下恢复某些基于计数的协议的秘密。粗略地说,攻击是基于以下事实:在考虑到响应后,机密(通过)对象出现在挑战中的概率与非机密(诱饵)对象不同。尽管他们提到易受此攻击影响的协议应使这种差异最小化,但除非有一些建议,否则他们并未提供有关如何实现此目标的详细信息。 ud ud在本文中,我们尝试通过对攻击进行概括来填补这一空白更全面的理论分析。我们的处理更加量化,这使我们能够描述一种方法,以便从理论上估计协议可以安全用于攻击的会话数的下限。我们的结果包括:1)提出了两个建议的修复程序,以使计数协议实际上以可用性为代价来抵御攻击; 2)观察到,只要进行了挑战生成,攻击也可以用于基于非计数的协议; 3)用户验证协议的两个主要设计原则,可以视为Yan等人的原则的扩展。在设计基于计数的协议以确定它们对这种攻击的敏感性时,可以将这种详细的理论处理用作指导。 Foxtail协议是Yan等人分析的协议之一,被用来代表我们的理论和实验结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号