relay attacks and distance bounding protocols
play

Relay Attacks and Distance Bounding Protocols Gildas Avoine - PowerPoint PPT Presentation

Relay Attacks and Distance Bounding Protocols Gildas Avoine Universit e catholique de Louvain, Belgium Workshop on Cryptography for the Internet of Things November 20 21, 2012, Antwerp, Belgium SUMMARY Relay Attacks Distance Bounding


  1. Relay Attacks and Distance Bounding Protocols Gildas Avoine Universit´ e catholique de Louvain, Belgium Workshop on Cryptography for the Internet of Things November 20 – 21, 2012, Antwerp, Belgium

  2. SUMMARY Relay Attacks Distance Bounding Distance Bounding Protocols Discussion

  3. RELAY ATTACKS Relay Attacks Distance Bounding Distance Bounding Protocols Discussion

  4. 1976 Chess Grand master problem (Conway 1976) J. H. Conway. On Numbers and Games. Number 6 in London Mathematical Society Monographs, 1976. Gildas Avoine Relay Attacks and Distance Bounding Protocols 4

  5. 1987 Feige-Fiat-Shamir ZK Protocol (1987) Shamir: “I can go to a Mafia-owned store a million successive times and they still will not be able to misrepresent themselves as me.” (Gleick quoting Shamir, 1987) Desmedt, Goutier, Bengio (1987): Mafia fraud Desmedt, Goutier, and Bengio. Special Uses and Abuses of the Fiat-Shamir Passport Protocol. CRYPTO’87 Gildas Avoine Relay Attacks and Distance Bounding Protocols 5

  6. 2006 Radio link over 50 meters (Hancke 2006). Hancke. Practical Attacks on Proximity Identification Systems. IEEE Symposium on Security and Privacy, 2006 Gildas Avoine Relay Attacks and Distance Bounding Protocols 6

  7. 2011 Attacks by Francillon, Danev, ˇ Capkun against passive car keyless entry and ignition systems (2011). Francillon, Danev, and ˇ Capkun. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. Network and Distributed System Security Symposium, 2011 Gildas Avoine Relay Attacks and Distance Bounding Protocols 7

  8. Today and Tomorrow Implementation included in libNFC (PN53x readers). Gildas Avoine Relay Attacks and Distance Bounding Protocols 8

  9. DISTANCE BOUNDING Relay Attacks Distance Bounding Distance Bounding Protocols Discussion

  10. Distance Bounding Based on the Speed of Light Measure the round-trip-time (RTT) of an auth. message ◦ Provide a bound on the distance. ◦ Idea introduced by Beth and Desmedt (1990). Reader Tag Computation Neighborhood Beth and Desmedt. Identification Tokens - or: Solving the Chess Grandmaster Problem. CRYPTO’90. Gildas Avoine Relay Attacks and Distance Bounding Protocols 10

  11. Distance Bounding Definition (Avoine et al. 2011) A distance bounding is a process whereby one party is assured: 1 Of the identity of a second party, 2 That the latter is present in the neighborhood of the verifying party, at some point in the protocol. Reader Reader Tag Adversary Tag Distance bounding does not avoid relay attacks. A Framework for Analyzing RFID Distance Bounding Protocols, 2011. Avoine, Bing¨ ol, Kardas, Lauradoux, and Martin. Gildas Avoine Relay Attacks and Distance Bounding Protocols 11

  12. Mafia and Terrorist Frauds Definition (Mafia Fraud) A mafia fraud is an attack where an adversary Reader defeats a distance bounding protocol using a Adversary man-in-the-middle (MITM) between the reader and an honest tag located outside the neighborhood. Tag Definition (Terrorist Fraud) A terrorist fraud is an attack where an adversary defeats a distance bounding protocol using a man-in-the-middle (MITM) between the reader and a dishonest tag located outside of the neighborhood, such that the latter actively helps the adversary to maximize her attack success probability, without giving to her any advantage for future attacks. Gildas Avoine Relay Attacks and Distance Bounding Protocols 12

  13. Distance Fraud Definition (Distance Fraud) Reader Given a distance bounding protocol, a distance fraud is an attack where a dishonest and lonely prover purports to be in the neighborhood of the verifier. Tag Gildas Avoine Relay Attacks and Distance Bounding Protocols 13

  14. Real Life ISO 14443 already includes a timeout. Mifare Plus has a distance bounding protocol. Gildas Avoine Relay Attacks and Distance Bounding Protocols 14

  15. Distance Bounding Based on the Speed of Light Reader Tag Accelerated computation Neighborhood Gildas Avoine Relay Attacks and Distance Bounding Protocols 15

  16. DISTANCE BOUNDING PROTOCOLS Relay Attacks Distance Bounding Distance Bounding Protocols Discussion

  17. Brands and Chaum’s Protocol (1993) Verifier (secret k ) Prover (secret k ) Start of fast phase for i = 1 to n C i ∈ R { 0 , 1 } Start Clock − − − − − − − − − − − → R i ∈ R { 0 , 1 } Stop Clock ← − − − − − − − − − − − Check ∆ t i ≤ ∆ t max End of fast phase Sign k ( C 1 || R 1 ||···|| C n || R n ) Check signature ← − − − − − − − − − − − − − − − − − − − − Question � 1 � n 1 Mafia fraud: 2 2 Terrorist fraud: 1 3 Distance fraud: 1 Brands and Chaum, Distance-Bounding Protocols, EUROCRYPT’93. Gildas Avoine Relay Attacks and Distance Bounding Protocols 17

  18. Hancke and Kuhn’s Protocol (2005) Reader Tag (secret K ) (secret K ) Pick a random N a Pick a random N b N a − − − − − − − → N b ← − − − − − − − � v 0 = 1 1 0 1 1 0 0 0 1 0 h ( K , N a , N b ) = v 1 = 0 1 1 1 1 0 0 1 0 0 Start of fast bit exchange for i = 1 to n Pick C i ∈ R { 0 , 1 } C i Start Clock − − − − − − − → � v 0 i , if C i = 0 R i = v 1 i , if C i = 1 R i Stop Clock ← − − − − − − − Question Check: △ t i ≤ t max � 3 Check: correctness of R i � n 1 Mafia fraud: End of fast bit exchange 4 2 Terrorist fraud: 1 � 3 � n 3 Distance fraud: 4 Hancke and Kuhn. An RFID Distance Bounding Protocol. SecureComm 2005. Gildas Avoine Relay Attacks and Distance Bounding Protocols 18

  19. DISCUSSION Relay Attacks Distance Bounding Distance Bounding Protocols Discussion

  20. Current Issues Improving the security w.r.t. the three frauds. Propagation delays are much shorter than processing times. Filling the gap between theory and practice. Defining clear adversary’s capabilities. Provably secure distance-bounding protocols: Serge Vaudenay’s talk. Gildas Avoine Relay Attacks and Distance Bounding Protocols 20

  21. Relay Attack in Chess (Chess Olympiad 2010) Gildas Avoine Relay Attacks and Distance Bounding Protocols 21

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend