Distance Hijacking Attacks on Distance Bounding Protocols
Cas Cremers
ETH Zurich
Kasper Rasmussen, Benedikt Schmidt, Srdjan Capkun Kasper Rasmussen, Benedikt Schmidt, Srdjan Capkun
Joint work with: Joint work with:
Distance Hijacking Attacks on Distance Bounding Protocols Cas - - PowerPoint PPT Presentation
Distance Hijacking Attacks on Distance Bounding Protocols Cas Cremers ETH Zurich Joint work with: Joint work with: Kasper Rasmussen, Benedikt Schmidt, Srdjan Capkun Kasper Rasmussen, Benedikt Schmidt, Srdjan Capkun Distance Bounding 2
ETH Zurich
Joint work with: Joint work with:
2
3
4
5
Phase 2: Fast response phase Phase 3: Finalize Phase 1: Setup
Prover Verifier nv nv xor np fresh np fresh nv Verify commit and signature Measure response time commit(np) np, sign(P, <nv, nv xor np>)
6
7
8
Phase 2: Fast response phase
Honest P' V nv nv xor np fresh np fresh nv Verify commit and signature Measure response time commit(np) Dishonest P np, sign(P,<nv, nv xor np>)
9
10
Protocol DH-attack? Brands and Chaum (Fiat-Shamir) Yes Brands and Chaum (Schnorr) Yes Brands and Chaum (signature) Yes Bussard and Bagga
Yes Hancke and Kuhn
Yes MAD Yes Meadows et al for F(..) = <NV,NP xor P> Yes Munilla and Peinado
Yes Poulidor
Yes WSBC+DB Noent Yes
11
Phase 2: Fast response phase Phase 3: Finalize Phase 1: Setup
12
– adversary flips some bits of an unknown message
13
GOOD protocol BAD prot. Honest P' card with bad protocol Server runs good protocol Attacker uses P card with good protocol
14
Mafia Fraud
Terrorist Fraud
Distance Hijacking
15
External Distance Fraud (~ mafia fraud) Lone Distance Fraud (~ distance fraud) Assisted Distance Fraud (~ terrorist fraud) Distance Hijacking
Is P honest? Yes No Is only P involved in the attack? Yes No Is one of the other involved parties honest? No Yes
16