Replay, Relay and Inverse-Sybil Attacks on Proximity Tracing Apps - - PowerPoint PPT Presentation

replay relay and inverse sybil attacks on proximity
SMART_READER_LITE
LIVE PREVIEW

Replay, Relay and Inverse-Sybil Attacks on Proximity Tracing Apps - - PowerPoint PPT Presentation

Replay, Relay and Inverse-Sybil Attacks on Proximity Tracing Apps Krzysztof Pietrzak 2020 Eurocrypt Rump Session, May 13th, Living Room Proximity Tracing . . . 8GD45AF3 8GD45AF3 . . . 8GD45AF3 Proximity Tracing . . . 8GD45AF3 8GD45AF3


slide-1
SLIDE 1

Replay, Relay and Inverse-Sybil Attacks

  • n Proximity Tracing Apps

2020 Eurocrypt Rump Session, May 13th, Living Room

Krzysztof Pietrzak

slide-2
SLIDE 2

Proximity Tracing

8GD45AF3 8GD45AF3 8GD45AF3 . . . . . .

slide-3
SLIDE 3

Proximity Tracing

8GD45AF3 8GD45AF3 8GD45AF3 . . . . . . . . . 8GD45AF3 . . . . . . 8GD45AF3 . . . . . .

slide-4
SLIDE 4

Proximity Tracing

8GD45AF3 8GD45AF3 8GD45AF3 . . . . . . . . . 8GD45AF3 . . . . . . 8GD45AF3

slide-5
SLIDE 5

Replay and Relay Attacks

8GD45AF3 8GD45AF3 8GD45AF3 . . . . . . . . .

slide-6
SLIDE 6

Replay and Relay Attacks

8GD45AF3 8GD45AF3 8GD45AF3 . . . . . . . . . 8GD45AF3

slide-7
SLIDE 7

Replay and Relay Attacks

8GD45AF3 8GD45AF3 8GD45AF3 . . . . . . . . . 8GD45AF3 8GD45AF3

slide-8
SLIDE 8

Replay and Relay Attacks

8GD45AF3 8GD45AF3 8GD45AF3 . . . . . . . . . 8GD45AF3 8GD45AF3

slide-9
SLIDE 9

Preventing Relay and Replay Attacks without Privacy

ID, K C tag = MACK(C) ID ID, tag, C

slide-10
SLIDE 10

Preventing Relay and Replay Attacks without Privacy

ID, K C tag = MACK(C) ID ID, tag, C ID, K ID, K

slide-11
SLIDE 11

Preventing Relay and Replay Attacks without Privacy

ID, K C tag = MACK(C) ID ID, tag, C ID, K ID, K tag

?

= MACK(C) ID, tag, C

slide-12
SLIDE 12

Preventing Relay and Replay Attacks without Privacy

ID, K C tag = MACK(C) ID ID, tag, C ID, K ID, K tag

?

= MACK(C) ID, tag, C

slide-13
SLIDE 13

Preventing Relay and Replay Attacks without Privacy

ID, K C tag = MACK(C) ID ID, tag, C ID, K ID, K tag

?

= MACK(C) ID, tag, C

slide-14
SLIDE 14

Delayed Authentication (eprint 2020/418)

tag = MACK(σ) ID, R σ := commit(C; R) ID, tag, σ ID, K σ := commit(C; R)

slide-15
SLIDE 15

Delayed Authentication (eprint 2020/418)

tag = MACK(σ) ID, R σ := commit(C; R) ID, tag, σ ID, K ID, K ID, K tag

?

= MACK(σ) ID, tag, σ σ := commit(C; R)

slide-16
SLIDE 16

Delayed Authentication (eprint 2020/418)

tag = MACK(σ) ID, R σ := commit(C; R) ID, tag, σ ID, K ID, K ID, K tag

?

= MACK(σ) ID, tag, σ σ := commit(C; R)

slide-17
SLIDE 17

Inverse Sybil Attacks

8GD45AF3 8GD45AF3 8GD45AF3

slide-18
SLIDE 18

Inverse Sybil Attacks

8GD45AF3 8GD45AF3 8GD45AF3

slide-19
SLIDE 19

Inverse Sybil Attacks

8GD45AF3 8GD45AF3 8GD45AF3

https://github.com/DP-3T/documents/issues/295