Relay Attacks and Distance Bounding Protocols
Gildas Avoine Universit´ e catholique de Louvain, Belgium
Workshop on Cryptography for the Internet of Things November 20 – 21, 2012, Antwerp, Belgium
Relay Attacks and Distance Bounding Protocols Gildas Avoine - - PowerPoint PPT Presentation
Relay Attacks and Distance Bounding Protocols Gildas Avoine Universit e catholique de Louvain, Belgium Workshop on Cryptography for the Internet of Things November 20 21, 2012, Antwerp, Belgium SUMMARY Relay Attacks Distance Bounding
Workshop on Cryptography for the Internet of Things November 20 – 21, 2012, Antwerp, Belgium
Gildas Avoine Relay Attacks and Distance Bounding Protocols 4
Desmedt, Goutier, and Bengio. Special Uses and Abuses of the Fiat-Shamir Passport Protocol. CRYPTO’87 Gildas Avoine Relay Attacks and Distance Bounding Protocols 5
Gildas Avoine Relay Attacks and Distance Bounding Protocols 6
Francillon, Danev, and ˇ
Network and Distributed System Security Symposium, 2011 Gildas Avoine Relay Attacks and Distance Bounding Protocols 7
Gildas Avoine Relay Attacks and Distance Bounding Protocols 8
Tag Reader Neighborhood Computation Beth and Desmedt. Identification Tokens - or: Solving the Chess Grandmaster Problem. CRYPTO’90. Gildas Avoine Relay Attacks and Distance Bounding Protocols 10
Reader Tag Adversary Reader Tag
Avoine, Bing¨
A Framework for Analyzing RFID Distance Bounding Protocols, 2011. Gildas Avoine Relay Attacks and Distance Bounding Protocols 11
Adversary Tag Reader
Gildas Avoine Relay Attacks and Distance Bounding Protocols 12
Tag Reader
Gildas Avoine Relay Attacks and Distance Bounding Protocols 13
Gildas Avoine Relay Attacks and Distance Bounding Protocols 14
Reader Neighborhood computation Accelerated Tag Gildas Avoine Relay Attacks and Distance Bounding Protocols 15
Verifier (secret k) Prover (secret k) Start of fast phase for i = 1 to n Start Clock
Ci∈R{0,1}
− − − − − − − − − − − → Stop Clock
Ri∈R{0,1}
← − − − − − − − − − − − Check ∆ti ≤ ∆tmax End of fast phase Check signature
Signk(C1||R1||···||Cn||Rn)
← − − − − − − − − − − − − − − − − − − − −
Brands and Chaum, Distance-Bounding Protocols, EUROCRYPT’93. Gildas Avoine Relay Attacks and Distance Bounding Protocols 17
Reader Tag (secret K) (secret K) Pick a random Na Pick a random Nb
Na
− − − − − − − →
Nb
← − − − − − − − h(K, Na, Nb) =
= 1 1 1 1 1 v1 = 1 1 1 1 1 Start of fast bit exchange for i = 1 to n Pick Ci ∈R {0, 1} Start Clock
Ci
− − − − − − − → Ri = v0
i , if Ci = 0
v1
i , if Ci = 1
Stop Clock
Ri
← − − − − − − − Check: △ti ≤ tmax Check: correctness of Ri End of fast bit exchange
Hancke and Kuhn. An RFID Distance Bounding Protocol. SecureComm 2005. Gildas Avoine Relay Attacks and Distance Bounding Protocols 18
Gildas Avoine Relay Attacks and Distance Bounding Protocols 20
Gildas Avoine Relay Attacks and Distance Bounding Protocols 21