a class of precomputation based distance bounding
play

A class of precomputation-based distance-bounding protocols Jorge - PowerPoint PPT Presentation

Introduction Lookup-based protocols Properties and security analysis Conclusions A class of precomputation-based distance-bounding protocols Jorge Toro-Pozo University of Luxembourg (joint work with Sjouke Mauw and Rolando Trujillo-Rasua,


  1. Introduction Lookup-based protocols Properties and security analysis Conclusions A class of precomputation-based distance-bounding protocols Jorge Toro-Pozo University of Luxembourg (joint work with Sjouke Mauw and Rolando Trujillo-Rasua, to appear at Euro S&P 2016) Nancy, France. March 16, 2016 Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  2. Introduction Lookup-based protocols Properties and security analysis Conclusions Relay attack: how to beat a grand master White Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  3. Introduction Lookup-based protocols Properties and security analysis Conclusions Relay attack: how to beat a grand master White Black Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  4. Introduction Lookup-based protocols Properties and security analysis Conclusions Relay attack: how to beat a grand master White Black d4 Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  5. Introduction Lookup-based protocols Properties and security analysis Conclusions Relay attack: how to beat a grand master White Black d4 d4 Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  6. Introduction Lookup-based protocols Properties and security analysis Conclusions Relay attack: how to beat a grand master White Black d4 d4 d5 Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  7. Introduction Lookup-based protocols Properties and security analysis Conclusions Relay attack: how to beat a grand master White Black d4 d4 d5 d5 Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  8. Introduction Lookup-based protocols Properties and security analysis Conclusions Relay attack: how to beat a grand master White Black d4 d4 d5 d5 Definition (Relay attack) A relay attack is a man-in-the-middle attack where the adversary manipulates the communication by only relaying the verbatim messages between reader and the tag. Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  9. Introduction Lookup-based protocols Properties and security analysis Conclusions Relay attack: how to beat a grand master White Black d4 d4 d5 d5 Definition (Relay attack) A relay attack is a man-in-the-middle attack where the adversary manipulates the communication by only relaying the verbatim messages between reader and the tag. Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  10. Introduction Lookup-based protocols Properties and security analysis Conclusions Solution: distance bounding protocols Definition (Distance Bounding) A distance bounding protocol is an authentication protocol that in addition checks the distance between tag and reader. The computed distance is an upper-bound on their actual distance. Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  11. Introduction Lookup-based protocols Properties and security analysis Conclusions Radio Frequency Identification - RFID Communication is contactless. Line-of-sight is not necessary. Messages are broadcast. Limited resources (memory, processor speed, energy, interaction time). Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  12. Introduction Lookup-based protocols Properties and security analysis Conclusions Radio Frequency Identification - RFID Communication is contactless. Line-of-sight is not necessary. Messages are broadcast. Limited resources (memory, processor speed, energy, interaction time). Tags respond to the reader’s requests without explicit agreement of their holder Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  13. Introduction Lookup-based protocols Properties and security analysis Conclusions Radio Frequency Identification - RFID Communication is contactless. Line-of-sight is not necessary. Messages are broadcast. Limited resources (memory, processor speed, energy, interaction time). Tags respond to the reader’s requests without explicit agreement of their holder Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  14. Introduction Lookup-based protocols Properties and security analysis Conclusions Distance bounding protocols are vulnerable Mafia-fraud attacks ... and also to other attacks, e.g. distance fraud terrorist fraud distance hijacking Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  15. Introduction Lookup-based protocols Properties and security analysis Conclusions Distance bounding protocols are vulnerable Mafia-fraud attacks ... and also to other attacks, e.g. distance fraud terrorist fraud distance hijacking Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  16. Introduction Lookup-based protocols Properties and security analysis Conclusions A few distance bounding protocols Brands and Chaum (Fiat-Shamir) Brands and Chaum (Schnorr) Brands and Chaum (signature) Bussard and Bagga CRCS Hancke and Kuhn Hitomi KA2 Kuhn, Luecken, Tippenhauer MAD Meadows et al. for F ( · · · ) = � NV , NP ⊕ P � Munilla and Peinado Noise resilient MAD Poulidor Reid et al. Swiss-Knife Tree WSBC+DB WSBC+DB Noent Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  17. Introduction Lookup-based protocols Properties and security analysis Conclusions Many of them have been broken Brands and Chaum (Fiat-Shamir) Brands and Chaum (Schnorr) Brands and Chaum (signature) Bussard and Bagga CRCS Hancke and Kuhn Hitomi KA2 Kuhn, Luecken, Tippenhauer MAD Meadows et al. for F ( · · · ) = � NV , NP ⊕ P � Munilla and Peinado Noise resilient MAD Poulidor Reid et al. Swiss-Knife Tree WSBC+DB WSBC+DB Noent Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  18. Introduction Lookup-based protocols Properties and security analysis Conclusions Some common principles Are composed by two phases: Slow phase: generation of random values, exchange of parameters, preparation of data structures. Fast phase: 1-bit messages, tag performs at most lookup/and/xor/. . . ; repeat this n times. Need very short processing time at the tag (otherwise the adversary could overclock the tag). Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  19. Introduction Lookup-based protocols Properties and security analysis Conclusions Some common principles Are composed by two phases: Slow phase: generation of random values, exchange of parameters, preparation of data structures. Fast phase: 1-bit messages, tag performs at most lookup/and/xor/. . . ; repeat this n times. Need very short processing time at the tag (otherwise the adversary could overclock the tag). Perform the authentication during the fast phase. Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  20. Introduction Lookup-based protocols Properties and security analysis Conclusions Some common principles Are composed by two phases: Slow phase: generation of random values, exchange of parameters, preparation of data structures. Fast phase: 1-bit messages, tag performs at most lookup/and/xor/. . . ; repeat this n times. Need very short processing time at the tag (otherwise the adversary could overclock the tag). Perform the authentication during the fast phase. Do not have a final slow phase. Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  21. Introduction Lookup-based protocols Properties and security analysis Conclusions Some common principles Are composed by two phases: Slow phase: generation of random values, exchange of parameters, preparation of data structures. Fast phase: 1-bit messages, tag performs at most lookup/and/xor/. . . ; repeat this n times. Need very short processing time at the tag (otherwise the adversary could overclock the tag). Perform the authentication during the fast phase. Do not have a final slow phase. We call them Lookup-based protocols Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

  22. Introduction Lookup-based protocols Properties and security analysis Conclusions Some common principles Are composed by two phases: Slow phase: generation of random values, exchange of parameters, preparation of data structures. Fast phase: 1-bit messages, tag performs at most lookup/and/xor/. . . ; repeat this n times. Need very short processing time at the tag (otherwise the adversary could overclock the tag). Perform the authentication during the fast phase. Do not have a final slow phase. We call them Lookup-based protocols Jorge Toro-Pozo University of Luxembourg A class of precomputation-based distance-bounding protocols

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend