Security Analysis of Distance Bounding Protocols Agnes BRELURUT, - - PowerPoint PPT Presentation

security analysis of distance bounding protocols
SMART_READER_LITE
LIVE PREVIEW

Security Analysis of Distance Bounding Protocols Agnes BRELURUT, - - PowerPoint PPT Presentation

Security Analysis of Distance Bounding Protocols Agnes BRELURUT, Pascal LAFOURCADE, David GERAULT LIMOS, Universit dAuvergne, France September 17th 2015 BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding


slide-1
SLIDE 1

Security Analysis of Distance Bounding Protocols

Agnes BRELURUT, Pascal LAFOURCADE, David GERAULT

LIMOS, Université d’Auvergne, France

September 17th 2015

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 1 / 25

slide-2
SLIDE 2

Context

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 2 / 25

slide-3
SLIDE 3

Relay Attacks

a

← − − − − − − − − −

b

− − − − − − − − − →

c

← − − − − − − − − −

a

← − − − − − − − − −

b

− − − − − − − − − →

c

← − − − − − − − − − Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars,

  • A. Francillon, 2011

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 3 / 25

slide-4
SLIDE 4

Counter measure : RTT check

Prover

(t) Prover Verifier Ci Ri (t)

Verifier Ci treshold (t) < treshold => Accept ∆ ∆ Close prover Far away prover Ri (t) > treshold => Reject

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 4 / 25

slide-5
SLIDE 5

Brands & Chaum : Protocol

Verifier V Prover P public key : y secret key : x Initialisation phase

commit(m)

← − − − − − − − − − − − − − − − − − − − − − m $ ← − {0,1}n Distance Bounding phase for i = 1 to n Pick ci ∈ {0,1} Start clock

ci

− − − − − − − − − − − − − − − − − − − − − → Stop clock

ri

← − − − − − − − − − − − − − − − − − − − − − ri := mi ⊕ci Check timers ∆ti Verification phase Check responses

  • pen commitment

← − − − − − − − − − − − − − − − − − − − − − Check signature

Signx (S)

← − − − − − − − − − − − − − − − − − − − − − S := c1||r1||...||cn||rn

OutV

− − − − − − − − − − − − − − − − − − − − − →

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 5 / 25

slide-6
SLIDE 6

Distance Bounding Protocol

Verifier V Prover P shared key : x shared key : x Initialisation phase

MessagesV

− − − − − − − − − − − − − − − − − − − − − − − − − − →

MessagesP

← − − − − − − − − − − − − − − − − − − − − − − − − − − a = fx(MessagesV ,MessagesP) Distance Bounding phase for i = 1 to n Start clock

ci

− − − − − − − − − − − − − − − − − − − − − − − − − − → Stop clock

ri

← − − − − − − − − − − − − − − − − − − − − − − − − − − ri = F(ci,ai,xi) Verification phase Check ∆ti, ri and S

S

← − − − − − − − − − − − − − − − − − − − − − − − − − − S = signx(transcript)

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 6 / 25

slide-7
SLIDE 7

Honest Prover

Mafia Fraud (MF) : an adversary A tries to prove that a prover P is close to a verifier V .

P ↔ A ↔ V

  • far away

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 7 / 25

slide-8
SLIDE 8

Honest Prover

Mafia Fraud (MF) : an adversary A tries to prove that a prover P is close to a verifier V .

P ↔ A ↔ V

  • far away

Impersonation Fraud (IF) : an adversary tries to im- personate the prover to the verifier.

A ↔ V

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 7 / 25

slide-9
SLIDE 9

Dishonest Prover

Distance Fraud : a far-away prover P∗ tries to prove that he is close to a verifier V .

P∗ ↔ V

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 8 / 25

slide-10
SLIDE 10

Dishonest Prover

Distance Fraud : a far-away prover P∗ tries to prove that he is close to a verifier V .

P∗ ↔ V

Distance Hijacking (DH) : a far-away prover P∗ tries to prove that he is close to a verifier V by taking ad- vantage of others provers P1,..,Pn.

P∗ ↔ P1,..,Pn ↔ V

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 8 / 25

slide-11
SLIDE 11

Dishonest Prover

Distance Fraud : a far-away prover P∗ tries to prove that he is close to a verifier V .

P∗ ↔ V

Distance Hijacking (DH) : a far-away prover P∗ tries to prove that he is close to a verifier V by taking ad- vantage of others provers P1,..,Pn.

P∗ ↔ P1,..,Pn ↔ V

Terrorist Fraud (TF) : a far-away prover P∗ helps an adversary A to prove that P∗ is close to a verifier V without giving A another advantage.

P∗ ↔ A ↔ V

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 8 / 25

slide-12
SLIDE 12

Motivations

No exhaustive list of DB protocols. No compared or classified. No relationship between threat models.

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 9 / 25

slide-13
SLIDE 13

Plan

1

Relations between Model of Threat

2

Attack and defence strategies

3

Conclusion and Perspective

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 10 / 25

slide-14
SLIDE 14

Plan

1

Relations between Model of Threat

2

Attack and defence strategies

3

Conclusion and Perspective

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 11 / 25

slide-15
SLIDE 15

The BMV Model(2013)

Distance Fraud (DF) :

P∗(x) ↔ (P1(x′),...,P′

m(x′) ↔ V1(y′),...,Vm(y′) ↔)V (y;rV )

Man-In-the-Middle (MiM) :

P1(x),...,Pm(x) ↔ A1 ↔ V1(y),...,Vz(y) Pm+1(x),...,Pl(x) ↔ A2(ViewA1) ↔ V (y)

Collusion Fraud (CF) :

P∗(x) ↔ A CF ↔ V0(y)

X→Y denotes that if the property X is satisfied then Y is also satisfied, an attack on the property Y implies an attack on the property X. DF DH CF TF MiM MF IF

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 12 / 25

slide-16
SLIDE 16

The BMV Model(2013)

Distance Fraud (DF) :

P∗(x) ↔ (P1(x′),...,P′

m(x′) ↔ V1(y′),...,Vm(y′) ↔)V (y;rV )

Man-In-the-Middle (MiM) :

P1(x),...,Pm(x) ↔ A1 ↔ V1(y),...,Vz(y) Pm+1(x),...,Pl(x) ↔ A2(ViewA1) ↔ V (y)

Collusion Fraud (CF) :

P∗(x) ↔ A CF ↔ V0(y)

X→Y denotes that if the property X is satisfied then Y is also satisfied, an attack on the property Y implies an attack on the property X. DF DH CF TF MiM MF IF

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 12 / 25

slide-17
SLIDE 17

The BMV Model(2013)

Distance Fraud (DF) :

P∗(x) ↔ (P1(x′),...,P′

m(x′) ↔ V1(y′),...,Vm(y′) ↔)V (y;rV )

Man-In-the-Middle (MiM) :

P1(x),...,Pm(x) ↔ A1 ↔ V1(y),...,Vz(y) Pm+1(x),...,Pl(x) ↔ A2(ViewA1) ↔ V (y)

Collusion Fraud (CF) :

P∗(x) ↔ A CF ↔ V0(y)

X→Y denotes that if the property X is satisfied then Y is also satisfied, an attack on the property Y implies an attack on the property X. DF DH CF TF MiM MF IF

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 12 / 25

slide-18
SLIDE 18

The BMV Model(2013)

Distance Fraud (DF) :

P∗(x) ↔ (P1(x′),...,P′

m(x′) ↔ V1(y′),...,Vm(y′) ↔)V (y;rV )

Man-In-the-Middle (MiM) :

P1(x),...,Pm(x) ↔ A1 ↔ V1(y),...,Vz(y) Pm+1(x),...,Pl(x) ↔ A2(ViewA1) ↔ V (y)

Collusion Fraud (CF) :

P∗(x) ↔ A CF ↔ V0(y)

X→Y denotes that if the property X is satisfied then Y is also satisfied, an attack on the property Y implies an attack on the property X. DF DH CF TF MiM MF IF

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 12 / 25

slide-19
SLIDE 19

The BMV Model(2013)

Distance Fraud (DF) :

P∗(x) ↔ (P1(x′),...,P′

m(x′) ↔ V1(y′),...,Vm(y′) ↔)V (y;rV )

Man-In-the-Middle (MiM) :

P1(x),...,Pm(x) ↔ A1 ↔ V1(y),...,Vz(y) Pm+1(x),...,Pl(x) ↔ A2(ViewA1) ↔ V (y)

Collusion Fraud (CF) :

P∗(x) ↔ A CF ↔ V0(y)

X→Y denotes that if the property X is satisfied then Y is also satisfied, an attack on the property Y implies an attack on the property X. X Y denotes that an attack on the property Y without sending the secret x implies an attack on the property X. DF DH CF TF MiM MF IF

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 12 / 25

slide-20
SLIDE 20

TF DF

X Y denotes that an attack on the property Y without sending the secret x implies an attack on the property X. Theorem (TF DF) If a protocol is not α-resistant to DF, then there exists an attack of kind TF which succeed with probability at least α. Proof : If P∗ ← − − − − − − − → V succeeds, then P∗ ← − − − → A TF ← → V succeeds with the same probability, if P∗ does not transmit his secret and A TF simply relays messages.

DF DH CF TF MiM MF IF

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 13 / 25

slide-21
SLIDE 21

TF DF

X Y denotes that an attack on the property Y without sending the secret x implies an attack on the property X. Theorem (TF DF) If a protocol is not α-resistant to DF, then there exists an attack of kind TF which succeed with probability at least α. Proof : If P∗ ← − − − − − − − → V succeeds, then P∗ ← − − − → A TF ← → V succeeds with the same probability, if P∗ does not transmit his secret and A TF simply relays messages.

DF DH CF TF MiM MF IF

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 13 / 25

slide-22
SLIDE 22

TF DF

X Y denotes that an attack on the property Y without sending the secret x implies an attack on the property X. Theorem (TF DF) If a protocol is not α-resistant to DF, then there exists an attack of kind TF which succeed with probability at least α. Proof : If P∗ ← − − − − − − − → V succeeds, then P∗ ← − − − → A TF ← → V succeeds with the same probability, if P∗ does not transmit his secret and A TF simply relays messages.

DF DH CF TF MiM MF IF

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 13 / 25

slide-23
SLIDE 23

TF DF

X Y denotes that an attack on the property Y without sending the secret x implies an attack on the property X. Theorem (TF DF) If a protocol is not α-resistant to DF, then there exists an attack of kind TF which succeed with probability at least α. Proof : If P∗ ← − − − − − − − → V succeeds, then P∗ ← − − − → A TF ← → V succeeds with the same probability, if P∗ does not transmit his secret and A TF simply relays messages.

DF DH CF TF MiM MF IF

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 13 / 25

slide-24
SLIDE 24

Plan

1

Relations between Model of Threat

2

Attack and defence strategies

3

Conclusion and Perspective

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 14 / 25

slide-25
SLIDE 25

Attack Strategies : Mafia Fraud

Pre ask strategy

Prover Verifier Adversary Ci c Ri r (t)

If c == ci, A knows ri. Else, he has to guess. A wins if he gives a good ri at all rounds 1

2 ·1+ 1 2 · 1 2

n = 3

4

  • n. Defence : Signature of the transcript

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 15 / 25

slide-26
SLIDE 26

Attack Strategies : Impersonation Fraud

Key recovery

Verifier V Prover P shared key : x shared key : x

ci

− − − − − − − − − − − − − − − − − − − − − − − − − − →

ri

← − − − − − − − − − − − − − − − − − − − − − − − − − − ri =

  • ai if ci = 0

ai ⊕xi if ci = 1

Outv

− − − − − − − − − − − − − − − − − − − − − − − − − − → Verifier V Attacker A Prover P shared key : x shared key : x

ci

− − − − − − − − − − → c′i = ci

c′i

− − − − − − − − − − →

ri

← − − − − − − − − − − − − − − − − − − − − − − − − − − ri =

  • ai if ci = 0

ai ⊕xi if ci = 1

Outv

− − − − − − − − − − − − − − − − − − − − − − − − − − →

If Outv = 1, ai == ai ⊕xi, so xi = 0. Else, xi = 1. After n executions, A recovers the whole key ! Defense : The responses can not just be a xor between the key and a one time pad.

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 16 / 25

slide-27
SLIDE 27

Attack Strategies : Distance fraud

Prover

(t) Prover Verifier Ci Ri (t)

Verifier Ci Ri Distance bound Normal scenario Distance Fraud

Two possible responses : if ci = 0, ri = ai and if ci = 1, ri = bi. 1

2 ·1+ 1 2 · 1 2

n = 3

4

n. Defence : The 2 possible responses should be complementary

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 17 / 25

slide-28
SLIDE 28

Attack Strategies : Distance fraud : Example

Let g be a PRF and f a PRF constructed as follows : fx(MV ,MP) =

  • a||a if MP = z

gx(MV ,MP) otherwise fx is a PRF.

Verifier V Prover P shared key : x shared key : x Initialisation phase

MV

− − − − − − − − − − − − − − − − − − − − − − − − − − →

MP

← − − − − − − − − − − − − − − − − − − − − − − − − − − MP = z a||a = fx(MV ,MP) Distance Bounding phase for i = 1 to n Start clock Stop clock

ri

← − − − − − − − − − − − − − − − − − − − − − − − − − − ri =

  • ai if ci = 0

ai if ci = 1

ci

− − − − − − − − − − − − − − − − − − − − − − − − − − → Check ∆ti, ri

Defense : The PRF output should not be split in several parts.

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 18 / 25

slide-29
SLIDE 29

Attack Strategies : Terrorist fraud

Verifier V Accomplice A Prover P shared key : x shared key : x Initialisation phase

NV

− − − − − − − − − − − − − − − − − − − − − − − − − − →

NP

← − − − − − − − − − − − − − − − − − − − − − − − − − − a = fx(NP,NV ) a = fx(NV ,NP) Stop clock

a

← − − − − − − − − − Distance Bounding phase for i = 1 to n Start clock

ci

− − − − − − − − − − → Stop clock

ri

← − − − − − − − − − − ri = ai ⊕ci Verification phase Check ∆ti, ri and S

S

← − − − − − − − − − − − − − − − − − − − − − − − − − − S = signx(transcript)

P can give a to A and allow a terrorist fraud with success probability 1, since a does not link any information about the secret key. Defense : Making the responses related to the key

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 19 / 25

slide-30
SLIDE 30

Improvements of Attacks : TF, IF, DH

IF : Threat model few considered. Exhaustive research on the key. 1

2

s, where s is the size of the key. DH : Threat model few considered. P∗ hopes that P responds correctly to V . 1

2

n, where n is the number of round in the DB phase. TF : P∗ gives responses to A . So, TF mainly filled with 1.

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 20 / 25

slide-31
SLIDE 31

Survey

42 protocols from 1993 to 2015.

2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 . . . 1993 Mea. NV TC Benea. Poul Yum NUS Kea ProProx TMA PrivDB (2015) BC Cea. HK Rea. TP SP MP KZP Lea. KA Aea. EBT JF Bagea. SKI DBopt SK FO Yang Hitomi AT Fea. BB VSSDB HPO GOR RC LPDB

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 21 / 25

slide-32
SLIDE 32

Survey

82 improvements = 28 DH + 10 DF + 0 MF + 30 IF + 1 MiM + 13 TF/CF.

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 22 / 25

slide-33
SLIDE 33

Survey

82 improvements = 28 DH + 10 DF + 0 MF + 30 IF + 1 MiM + 13 TF/CF. 9 survivors : no attacks with probability of success at 1.

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 22 / 25

slide-34
SLIDE 34

Survey

82 improvements = 28 DH + 10 DF + 0 MF + 30 IF + 1 MiM + 13 TF/CF. 9 survivors : no attacks with probability of success at 1.

Protocols Success Probability DH DF MF IF MiM TF CF KZP (2008) 1

2

n 3

4

n [8] 1

2

n [8] 1

2

s 1

2

n [8] 3

4

v [8] 3

4

v [8] Hitomi (2010) 1

2

n [5] 3

4

n 1

2

n [9] 1

2

n 1

2

n [9] 3

4

v [9] 3

4

v [9] NUS (2011) 1

2

n 3

4

n [1] 1

2

n [7] 1

2

n [7] 1

2

n [7] 3

4

v 3

4

v SKIpro (2013) 1

2

n 3

4

n [2] 2

3

n [2] 1

2

s 2

3

n [2] 5

6

v [3] 5

6

v [3] Fischlin & Onete (2013) 1

2

n 3

4

n [10] 3

4

n [10] 1

2

2s 3

4

n [10] 3

4

v [10] 3

4

v [10] DB1 (2014) 1

t

n 1

t

n [4] 1

t

n [4] 1

2

s 1

t

n [4] t−1

t

v [4] t−1

t

v [4] DB2 (2014) 1

2

n

  • 1

√ 2

n [4] 1

2

n [4] 1

2

s 1

2

n [4]

  • 1

√ 2

v [4]

  • 1

√ 2

v [4] ProProx (2014) 1

2

n·s

  • 1

√ 2

ns [11] 1

2

ns [11] 1

2

s [11] 1

2

ns [11]

  • 1

√ 2

ns [11]

  • 1

√ 2

ns [11] VSSDB (2014) 1

2

n 3

4

n [6] 1

2

n [6] 1

2

2s [6] 1

2

n [6] 3

4

v [6] 3

4

v [6]

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 22 / 25

slide-35
SLIDE 35

Plan

1

Relations between Model of Threat

2

Attack and defence strategies

3

Conclusion and Perspective

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 23 / 25

slide-36
SLIDE 36

Conclusion and Perspective

The relationship between threats models. Identify more easily the properties of a DB protocols. Compilation and classification of 42 protocols. Graph of dependency. 82 improvements of attacks. 9 still secure protocols. Tool box : strategies of attack/defense.

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 24 / 25

slide-37
SLIDE 37

Conclusion and Perspective

The relationship between threats models. Identify more easily the properties of a DB protocols. Compilation and classification of 42 protocols. Graph of dependency. 82 improvements of attacks. 9 still secure protocols. Tool box : strategies of attack/defense. Futur works : Formal verification. Best protocol design.

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 24 / 25

slide-38
SLIDE 38

Thanks for your attention !

Questions ?

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 25 / 25

slide-39
SLIDE 39

References I

Mohammad Reza Sohizadeh Abyaneh. Security analysis of two distance-bounding protocols. CoRR, abs/1107.3047, 2011. Ioana Boureanu, Aikaterini Mitrokotsa, and Serge Vaudenay. Practical & provably secure distance-bounding. IACR Cryptology ePrint Archive, 2013 :465, 2013. Ioana Boureanu, Aikaterini Mitrokotsa, and Serge Vaudenay. Towards secure distance bounding. In Fast Software Encryption - 20th International Workshop, FSE 2013, pages 55–67, Singapore, March 2013. Ioana Boureanu and Serge Vaudenay. Optimal proximity proofs. In Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers, pages 170–190, 2014.

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 26 / 25

slide-40
SLIDE 40

References II

Cas Cremers, Kasper Bonne Rasmussen, Benedikt Schmidt, and Srdjan Capkun. Distance hijacking attacks on distance bounding protocols. In IEEE Symposium on Security and Privacy, 2012. Sébastien Gambs, Marc-Olivier Killijian, Cédric Lauradoux, Cristina Onete, Matthieu Roy, and Moussa Traoré. VSSDB : A Verifiable Secret-Sharing and Distance-Bounding protocol. In International Conference on Cryptography and Information security (BalkanCryptSec’14), Istanbul, Turkey, October 2014. Ali Özhan Gürel, Atakan Arslan, and Mete Akgün. Non-uniform stepping approach to rfid distance bounding problem. In Proceedings of the 5th International Workshop on Data Privacy Management, and 3rd International Conference on Autonomous Spontaneous Security, DPM’10/SETOP’10, pages 64–78, Berlin, Heidelberg, 2011. Springer-Verlag.

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 27 / 25

slide-41
SLIDE 41

References III

Gaurav Kapoor, Wei Zhou, and Selwyn Piramuthu. Distance bounding protocol for multiple RFID tag authentication. In 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II : Workshops, pages 115–120, 2008. Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, and Jan C. A. van der Lubbe. Shedding some light on RFID distance bounding protocols and terrorist attacks. CoRR, abs/0906.4618, 2009. Serge Vaudenay. On modeling terrorist fraud. In Provable security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings, pages 1–20, 2013. Serge Vaudenay. Proof of proximity of knowledge. IACR Cryptology ePrint Archive, 2014 :695, 2014.

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 28 / 25

slide-42
SLIDE 42

References IV

BRELURUT, LAFOURCADE, GERAULT (LIMOS, France) Security Analysis of Distance Bounding Protocols September 17th 2015 29 / 25