Towards Secure Distance Bounding Ioana Boureanu, Katerina - - PowerPoint PPT Presentation

towards secure distance bounding
SMART_READER_LITE
LIVE PREVIEW

Towards Secure Distance Bounding Ioana Boureanu, Katerina - - PowerPoint PPT Presentation

Towards Secure Distance Bounding Ioana Boureanu, Katerina Mitrokotsa, Serge Vaudenay COLE POLYTECHNIQUE FDRALE DE LAUSANNE http://lasec.epfl.ch/ SV 2013 distance bounding FSE 2013 1 / 48 1 Why Distance-Bounding? Towards a Secure


slide-1
SLIDE 1

Towards Secure Distance Bounding

Ioana Boureanu, Katerina Mitrokotsa, Serge Vaudenay

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE

http://lasec.epfl.ch/

SV 2013 distance bounding FSE 2013 1 / 48

slide-2
SLIDE 2

1

Why Distance-Bounding?

2

Towards a Secure Protocol

3

The SKI Protocol

SV 2013 distance bounding FSE 2013 2 / 48

slide-3
SLIDE 3

1

Why Distance-Bounding?

2

Towards a Secure Protocol

3

The SKI Protocol

SV 2013 distance bounding FSE 2013 3 / 48

slide-4
SLIDE 4

Playing against two Chess Grandmasters

✛ ✲ malicious player malicious player chess grandmaster #1 chess grandmaster #2

SV 2013 distance bounding FSE 2013 4 / 48

slide-5
SLIDE 5

Relay Attacks

honest prover honest verifier adversary ✲ a ✲ a ✲ a ✛b ✛ b ✛b ✲ c ✲ c ✲ c

SV 2013 distance bounding FSE 2013 5 / 48

slide-6
SLIDE 6

A Nice Playground for Relay Attacks

Wireless Car Locks

wireless key car

SV 2013 distance bounding FSE 2013 6 / 48

slide-7
SLIDE 7

A Nice Playground for Relay Attacks

Corporate RFID Card for Access Control

SV 2013 distance bounding FSE 2013 7 / 48

slide-8
SLIDE 8

A Nice Playground for Relay Attacks

Contactless Credit Card Payment

wireless credit card payment

SV 2013 distance bounding FSE 2013 8 / 48

slide-9
SLIDE 9

The Brands-Chaum Protocol

Distance-Bounding Protocols [Brands-Chaum EUROCRYPT 1993]

Verifier Prover public key: y secret key: x initialization phase

Commit(m)

← − − − − − − − − − − − −

pick m distance bounding phase for i = 1 to n pick ci start clock

ci

− − − − − − − − − − − − →

stop clock

ri

← − − − − − − − − − − − −

ri = mi ⊕ ci check timers termination phase check responses

  • pen commitment

← − − − − − − − − − − − −

check signature

Signx (c,r)

← − − − − − − − − − − − −

OutV

− − − − − − − − − − − − →

SV 2013 distance bounding FSE 2013 9 / 48

slide-10
SLIDE 10

The Speed of Light

time error of 1µs = distance error of 300m

SV 2013 distance bounding FSE 2013 10 / 48

slide-11
SLIDE 11

Distance Bounding

interactive proof for proximity a verifier (honest) a prover (may be malicious) a secret to characterize the prover (may be symmetric) concurrency: many provers and verifiers around, plus malicious participants completeness: if the honest prover is close to the verifier, the verifier accepts soundness: if the verifier accept, then a close participant must hold the secret secure: when honestly run, the secret must not leak

SV 2013 distance bounding FSE 2013 11 / 48

slide-12
SLIDE 12

Distance Fraud

P∗ ←

→ V

  • far away

a malicious prover P∗ tries to prove that he is close to a verifier V

SV 2013 distance bounding FSE 2013 12 / 48

slide-13
SLIDE 13

Mafia Fraud

Major Security Problems with the “Unforgeable” (Feige)-Fiat-Shamir Proofs of Identity and How to Overcome Them [Desmedt SECURICOM 1988]

P ←

→ A ← → V

  • far away

an adversary A tries to prove that a prover P is close to a verifier V

SV 2013 distance bounding FSE 2013 13 / 48

slide-14
SLIDE 14

Terrorist Fraud

Major Security Problems with the “Unforgeable” (Feige)-Fiat-Shamir Proofs of Identity and How to Overcome Them [Desmedt SECURICOM 1988]

P∗ ←

→ A ← → V

  • far away

a malicious prover P∗ helps an adversary A to prove that P∗ is close to a verifier V without giving A another advantage

SV 2013 distance bounding FSE 2013 14 / 48

slide-15
SLIDE 15

Impersonation Fraud

An Efficient Distance Bounding RFID Authentication Protocol [Avoine-Tchamkerten ISC 2009]

A ←

→ V

an adversary A tries to prove that a prover P is close to a verifier V

SV 2013 distance bounding FSE 2013 15 / 48

slide-16
SLIDE 16

Distance Hijacking

Distance Hijacking Attacks on Distance Bounding Protocols [Cremers-Rasmussen-Schmidt- ˇ Capkun IEEE S&P 2012]

P∗ ←

→ P′ ← → V

  • far away

a malicious prover P∗ tries to prove that he is close to a verifier V by taking advantage of other provers P′

SV 2013 distance bounding FSE 2013 16 / 48

slide-17
SLIDE 17

A General Threat Model

distance fraud:

P(x) far from all V(x)’s want to make one V(x) accept (interaction with other P(x′) and V(x′) possible anywhere)

→ also captures distance hijacking man-in-the-middle:

learning phase: A interacts with many P’s and V’s attack phase: P(x)’s far away from V(x)’s, A interacts with them and possible P(x′)’s and V(x′)’s

A wants to make one V(x) accept

→ also captures impersonation collusion fraud:

P(x) far from all V(x)’s interacts with A and makes one V(x) accept, but View(A) does not give any advantage to mount a man-in-the-middle attack

SV 2013 distance bounding FSE 2013 17 / 48

slide-18
SLIDE 18

Known Protocols and Security Results

success probability of best known “regular” attacks (TF with no tolerance to noise + no malicious PRF)

Protocol Success Probability Distance-Fraud MiM Collusion-Fraud Brands & Chaum

(1/2)n (1/2)n

1 Bussard & Bagga 1

(1/2)n

1 ˇ Capkun et al.

(1/2)n (1/2)n

1 Hancke & Kuhn

(3/4)n (3/4)n

1 Reid et al.

(3/4)n

1

(3/4)ν

Singel´ ee & Preneel

(1/2)n (1/2)n

1 Tu & Piramuthu

(3/4)n

1

(3/4)ν

Munilla & Peinado

(3/4)n (3/5)n

1 Swiss-Knife

(3/4)n (1/2)n (3/4)ν

Kim & Avoine

(7/8)n (1/2)n

1 Nikov & Vauclair 1/k

(1/2)n

1 Avoine et al.

(3/4)n (2/3)n (2/3)ν

SV 2013 distance bounding FSE 2013 18 / 48

slide-19
SLIDE 19

1

Why Distance-Bounding?

2

Towards a Secure Protocol

3

The SKI Protocol

SV 2013 distance bounding FSE 2013 19 / 48

slide-20
SLIDE 20

The Hancke-Kuhn Protocol

An RFID Distance-Bounding Protocol [Hancke-Kuhn SECURECOMM 2005]

Verifier Prover secret: x secret: x initialization phase pick NV

NV

− − − − − − − − − − − − →

NP

← − − − − − − − − − − − −

pick NP a1a2 = fx(NP,NV ) a1a2 = fx(NP,NV ) distance bounding phase for i = 1 to n pick ci ∈ {1,2} start clock

ci

− − − − − − − − − − − − →

stop clock

ri

← − − − − − − − − − − − −

ri =

  • a1,i

if ci = 1 a2,i if ci = 2 check responses check timers

OutV

− − − − − − − − − − − − →

SV 2013 distance bounding FSE 2013 20 / 48

slide-21
SLIDE 21

A Terrorist Fraud against The Hancke-Kuhn Protocol

Verifier Adversary Malicious Prover secret: x secret: x initialization phase pick NV

NV

− − − − − − − − − − − − →

NV

− − − − − − − − − − − − →

pick NP a1a2 = fx(NP,NV )

NP

← − − − − − − − − − − − −

NP,a1,a2

← − − − − − − − − − − − −

a1a2 = fx(NP,NV ) distance bounding phase for i = 1 to n pick ci ∈ {1,2} start clock

ci

− − − − − − − − − − − − →

stop clock

ri

← − − − − − − − − − − − −

ri = aci,i check responses check timers

OutV

− − − − − − − − − − − − →

SV 2013 distance bounding FSE 2013 21 / 48

slide-22
SLIDE 22

The Reid et al. Protocol (DBENC)

Detecting Relay Attacks with Timing-based Protocols [Reid-Nieto-Tang-Senadji ASIACCS 2007]

Verifier Prover secret: x secret: x initialization phase pick NV

NV

− − − − − − − − − − − − →

pick NP a1 = fx(NP,NV )

NP

← − − − − − − − − − − − −

a1 = fx(NP,NV ) a2 = a1 ⊕ x a2 = a1 ⊕ x distance bounding phase for i = 1 to n pick ci ∈ {1,2} start clock

ci

− − − − − − − − − − − − →

stop clock

ri

← − − − − − − − − − − − −

ri = aci,i check responses check timers

OutV

− − − − − − − − − − − − →

resist to terrorist fraud: if a1 and a2 leak, then x as well!

SV 2013 distance bounding FSE 2013 22 / 48

slide-23
SLIDE 23

A Man-in-the-Middle against DBENC

The Swiss-Knife RFID Distance Bounding Protocol [Kim-Avoine-Koeune-Standaert-Pereira ICISC 2008]

Verifier Adversary Prover secret: x secret: x initialization phase pick NV

NV

− − − − − − − − − − − − →

select j, b

NV

− − − − − − − − − − − − →

pick NP a = fx(NP,NV )

NP

← − − − − − − − − − − − −

NP

← − − − − − − − − − − − −

a = fx(NP,NV ) distance bounding phase for i = 1 to n pick c∗

i ∈ {1,2}

start clock

c∗

i

− − − − − − − − − − − − →

ci = c∗

i ⊕ 1i=j ci

− − − − − − − − − − − − →

stop clock

r∗

i

← − − − − − − − − − − − −

r∗

i = ri ⊕ b.1i=j ri

← − − − − − − − − − − − −

ri = ai ⊕ xi.1ci=2 check responses check timers

OutV

− − − − − − − − − − − − →

fact 1: rj is the correct response to cj fact 2: OutV = 1 iff r∗

j is the correct response to cj ⊕ 1

consequence: the adversary deduces aj and aj ⊕ xj, so xj as well

SV 2013 distance bounding FSE 2013 23 / 48

slide-24
SLIDE 24

A Man-in-the-Middle against Other DBENC

The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks [Bay-Boureanu-Mitrokotsa-Spulber-Vaudenay Inscrypt 2012]

set a2 = Enca1(x)

  • ne-time pad: Enca1(x) = x ⊕ a1

addition modulo q: Enca1(x) = x − a1 mod q modular addition with random factor: Enca1(x;u) = (u,ux − a1 mod q) for a random invertible u all instances broken

SV 2013 distance bounding FSE 2013 24 / 48

slide-25
SLIDE 25

The TDB Protocol

How Secret-Sharing can Defeat Terrorist Fraud [Avoine-Lauradoux-Martin ACM WiSec 2011]

Verifier Prover secret: x secret: x initialization phase

NP

← − − − − − − − − − − − −

pick NP pick NV

NV

− − − − − − − − − − − − →

a1a2 = fx(NP,NV ) a1a2 = fx(NP,NV ) distance bounding phase for i = 1 to n pick ci ∈ {1,2,3} start clock

ci

− − − − − − − − − − − − →

stop clock

ri

← − − − − − − − − − − − −

ri =

  

a1,i if ci = 1 a2,i if ci = 2 xi ⊕ a1,i ⊕ a2,i if ci = 3 check responses check timers

OutV

− − − − − − − − − − − − →

resist to man-in-the-middle: two answers to ci don’t leak xi!

SV 2013 distance bounding FSE 2013 25 / 48

slide-26
SLIDE 26

Security Proofs Based on PRF

if the adversary can break the scheme with a PRF, then he can break an idealized scheme with the PRF replaced by a truly random function this argument is valid when both these conditions are met:

the adversary does not have access to the PRF key the PRF key is only used by the PRF

as far as distance fraud is concerned, condition 1 is not met! for most of terrorist fraud protections, condition 2 is not met!

SV 2013 distance bounding FSE 2013 26 / 48

slide-27
SLIDE 27

Programming a PRF

On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols [Boureanu-Mitrokotsa-Vaudenay Latincrypt 2012]

given a PRF g, let fx(NP,NV) =

  • xx

if NP = x gx(NP,NV)

  • therwise

f is a PRF!

SV 2013 distance bounding FSE 2013 27 / 48

slide-28
SLIDE 28

Distance Fraud with a Programmed PRF against the TDB Protocol

On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols [Boureanu-Mitrokotsa-Vaudenay Latincrypt 2012]

Verifier Malicious Prover secret: x secret: x initialization phase

NP

← − − − − − − − − − − − −

pick NP = x pick NV

NV

− − − − − − − − − − − − →

a1a2 = fx(NP,NV ) a1 = a2 = x a1a2 = fx(NP,NV ) distance bounding phase for i = 1 to n pick ci ∈ {1,2,3} start clock ri = xi ci ri stop clock check responses check timers

OutV

− − − − − − − − − − − − →

SV 2013 distance bounding FSE 2013 28 / 48

slide-29
SLIDE 29

Using PRF Masking

Verifier Prover secret: x secret: x initialization phase pick a, NV

NP

← − − − − − − − − − − − −

pick NP M = a⊕ fx(NP,NV )

M,NV

− − − − − − − − − − − − →

a = M ⊕ fx(NP,NV ) distance bounding phase for i = 1 to n pick ci ∈ {1,2,3} start clock

ci

− − − − − − − − − − − − →

stop clock

ri

← − − − − − − − − − − − −

ri =

  

a1,i if ci = 1 a2,i if ci = 2 xi ⊕ a1,i ⊕ a2,i if ci = 3 check responses check timers

OutV

− − − − − − − − − − − − →

a is now chosen by the verifier

SV 2013 distance bounding FSE 2013 29 / 48

slide-30
SLIDE 30

Man-in-the-Middle Attack with a Programmed PRF

On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols [Boureanu-Mitrokotsa-Vaudenay Latincrypt 2012]

take a PRF g define a predicate trapdoorx(¯

αt) ⇐ ⇒ t = gx(¯ α)⊕ right half(x),

fx(NP,NV) =

  

a1a2 = αβγβ⊕ gx(α) if ¬trapdoorx(NV) where (α,β,γ) = gx(NP,NV) a1 = a2 = x

  • therwise

f is a PRF! attack:

1: play with P and send c = (1,...,1,3,...,3) to obtain from the

responses ¯

αt satisfying trapdoorx

2: play with P again with NV = ¯

αt and get x!

SV 2013 distance bounding FSE 2013 30 / 48

slide-31
SLIDE 31

Other Results based on Programmed PRFs

On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols [Boureanu-Mitrokotsa-Vaudenay Latincrypt 2012]

protocol distance fraud man-in-the-middle attack TDB Avoine-Lauradoux-Martin [ACM WiSec 2011]

√ √

D¨ urholz-Fischlin-Kasper-Onete [ISC 2011]

– Hancke-Kuhn [Securecomm 2005]

– Avoine-Tchamkerten [ISC 2009]

– Reid-Nieto-Tang-Senadji [ASIACCS 2007]

√ √

Swiss-Knife Kim-Avoine-Koeune-Standaert- Pereira [ICISC 2008] –

SV 2013 distance bounding FSE 2013 31 / 48

slide-32
SLIDE 32

Using Circular-Keying Security

Verifier Prover secret: x secret: x initialization phase pick a, NV

NP

← − − − − − − − − − − − −

pick NP M = a⊕ fx(NP,NV )

M,NV

− − − − − − − − − − − − →

a = M ⊕ fx(NP,NV ) distance bounding phase for i = 1 to n pick ci ∈ {1,2,3} start clock

ci

− − − − − − − − − − − − →

stop clock

ri

← − − − − − − − − − − − −

ri =

  

a1,i if ci = 1 a2,i if ci = 2 xi ⊕ a1,i ⊕ a2,i if ci = 3 check responses check timers

OutV

− − − − − − − − − − − − →

f is a PRF with circular-keying security

SV 2013 distance bounding FSE 2013 32 / 48

slide-33
SLIDE 33

Circular Keying Security

if A makes queries yi,ai,bi → (ai · x′)+(bi · fx(yi))

A cannot distinguish if x = x′ or x and x′ are independent

caveat: queries must be such that

∀i1,...,iq,c1,...,cq

yi1 = ··· = yiq

q j=1 cjbij = 0

  • =

q

j=1

cjaij = 0 sanity check: easily constructed in the random oracle model

SV 2013 distance bounding FSE 2013 33 / 48

slide-34
SLIDE 34

Problem with Noise

Verifier Prover secret: x secret: x initialization phase pick a, NV

NP

← − − − − − − − − − − − −

pick NP M = a⊕ fx(NP,NV )

M,NV

− − − − − − − − − − − − →

a = M ⊕ fx(NP,NV ) distance bounding phase for i = 1 to n pick ci ∈ {1,2,3} start clock

ci

− − − − − − − − − − − − →

stop clock

ri

← − − − − − − − − − − − −

ri =

  

a1,i if ci = 1 a2,i if ci = 2 xi ⊕ a1,i ⊕ a2,i if ci = 3 check at least τ correct responses check timers

OutV

− − − − − − − − − − − − →

SV 2013 distance bounding FSE 2013 34 / 48

slide-35
SLIDE 35

Terrorist Fraud based on Tolerance to Noise

Distance Bounding for RFID: Effectiveness of Terrorist Fraud [Hancke IEEE RFID-TA 2012]

Verifier Adversary Malicious Prover secret: x secret: x initialization phase pick a, NV

NP

← − − − − − − − − − − − −

NP

← − − − − − − − − − − − −

pick NP M = a⊕ fx(NP,NV )

M,NV

− − − − − − − − − − − − →

M,NV

− − − − − − − − − − − − →

a = M ⊕ fx(NP,NV )

Fi,i∈I

← − − − − − − − − − − − −

I = g(x) distance bounding phase for i = 1 to n pick ci ∈ {1,2,3} start clock

ci

− − − − − − − − − − − − →

stop clock

ri

← − − − − − − − − − − − −

ri = F ∗

i (ci)

check ≥ τ responses check timers

OutV

− − − − − − − − − − − − →

Fi(c) =

  

a1,i if c = 1 a2,i if c = 2 xi ⊕ a1,i ⊕ a2,i if c = 3

#I = τ

F ∗

i = Fi if i ∈ I

F ∗

i = random otherwise

SV 2013 distance bounding FSE 2013 35 / 48

slide-36
SLIDE 36

1

Why Distance-Bounding?

2

Towards a Secure Protocol

3

The SKI Protocol

SV 2013 distance bounding FSE 2013 36 / 48

slide-37
SLIDE 37

Why SKI?

Symmetric Key Infrastructure? Sheffield Kidney Institute? Serial Killers Incorporated?

Serge Katerina Ioana

SV 2013 distance bounding FSE 2013 37 / 48

slide-38
SLIDE 38

The SKI Protocol

Verifier Prover secret: x secret: x initialization phase

NP

← − − − − − − − − − − − −

pick NP pick a,Lµ,NV

M,Lµ,NV

− − − − − − − − − − − − →

M = a⊕ fx(NP,NV ,Lµ) a = M ⊕ fx(NP,NV ,Lµ) x′ = Lµ(x) x′ = Lµ(x) distance bounding phase for i = 1 to n pick ci ∈ {1,2,3} start clock

ci

− − − − − − − − − − − − →

stop clock

ri

← − − − − − − − − − − − −

ri =

  

a1,i if ci = 1 a2,i if ci = 2 x′

i ⊕ a1,i ⊕ a2,i

if ci = 3 check ≥ τ responses check timers

OutV

− − − − − − − − − − − − →

f is a circular-keying secure PRF, Lµ(x) = (µ· x,...,µ· x)

SV 2013 distance bounding FSE 2013 38 / 48

slide-39
SLIDE 39

Completeness of SKI

B(n,τ,q) =

n

i=τ

n

i

  • qi(1− q)n−i

assume honest execution of the protocol let pnoise be the probability that one round is incorrect probability to pass is B(n,τ,1− pnoise) (Chernoff) for τ

n < 1− pnoise −ε, this is more than 1− e−2ε2n

SV 2013 distance bounding FSE 2013 39 / 48

slide-40
SLIDE 40

Best Distance Fraud against SKI

Verifier Malicious Prover secret: x secret: x initialization phase

NP

← − − − − − − − − − − − −

pick NP pick a,Lµ,NV

M,Lµ,NV

− − − − − − − − − − − − →

M = a⊕ fx(NP,NV ,Lµ) a = M ⊕ fx(NP,NV ,Lµ) x′ = Lµ(x) x′ = Lµ(x) distance bounding phase for i = 1 to n pick ci ∈ {1,2,3} start clock pick ri with largest preimage by Fi ci ri stop clock check ≥ τ responses check timers

OutV

− − − − − − − − − − − − →

Pr[round i correct] = 3 4

SV 2013 distance bounding FSE 2013 40 / 48

slide-41
SLIDE 41

Best Distance Fraud against SKI

Pr[round i correct]

=

Pr[Fi constant]+ 2 3 (1− Pr[Fi constant])

=

1 4 + 2 3 ×

  • 1− 1

4

  • =

3 4 Fi is a 3-to-2 mapping so, the largest preimage has 3 (if Fi is constant) or 2 elements it is constant iff a1,i = a2,i = xi, i.e. with probability 1

4

probability to pass is B(n,τ, 3

4)

(Chernoff) for τ

n > 3 4 +ε, this is less than e−2ε2n

SV 2013 distance bounding FSE 2013 41 / 48

slide-42
SLIDE 42

Best Mafia Fraud against SKI

Verifier Adversary Prover secret: x secret: x initialization phase

NP

← − − − − − − − − − − − −

NP

← − − − − − − − − − − − −

pick NP pick a,Lµ,NV

M,Lµ,NV

− − − − − − − − − − − − →

M,Lµ,NV

− − − − − − − − − − − − →

distance bounding phase for i = 1 to n pick c∗

i c∗

i

− − − − − − − − − − − − →

r∗

i

← − − − − − − − − − − − −

r∗

i = Fi(c∗ i )

for i = 1 to n pick ci ∈ {1,2,3} start clock

ci

− − − − − − − − − − − − →

stop clock

ri

← − − − − − − − − − − − −

ri = r∗

i

check ≥ τ responses check timers

OutV

− − − − − − − − − − − − →

Pr[round i correct] = 2 3

SV 2013 distance bounding FSE 2013 42 / 48

slide-43
SLIDE 43

Best Mafia Fraud against SKI

Pr[round i correct]

=

Pr[ci = c∗

i ]+ 1

2 (1− Pr[ci = c∗

i ])

=

1 3 + 1 2 ×

  • 1− 1

3

  • =

2 3 probability to pass is B(n,τ, 2

3)

(Chernoff) for τ

n > 2 3 +ε, this is less than e−2ε2n

SV 2013 distance bounding FSE 2013 43 / 48

slide-44
SLIDE 44

Best Terrorist Fraud against SKI

Verifier Adversary Malicious Prover secret: x secret: x initialization phase

NP

← − − − − − − − − − − − −

NP

← − − − − − − − − − − − −

pick NP pick a,Lµ,NV

M,Lµ,NV

− − − − − − − − − − − − →

M,Lµ,NV

− − − − − − − − − − − − →

pick c∗

1,...,c∗ n

F ∗

i (c) = Fi(c)

if c = c∗

i F∗

← − − − − − − − − − − − −

F ∗

i (c) = rnd else

distance bounding phase for i = 1 to n pick ci ∈ {1,2,3} start clock

ci

− − − − − − − − − − − − →

stop clock

ri

← − − − − − − − − − − − −

ri = F ∗

i (ci)

check ≥ τ responses check timers

OutV

− − − − − − − − − − − − →

Pr[round i correct] = 5 6

SV 2013 distance bounding FSE 2013 44 / 48

slide-45
SLIDE 45

Best Terrorist Fraud against SKI

Pr[round i correct]

=

Pr[ci = c∗

i ]+ 1

2 (1− Pr[ci = c∗

i ])

=

2 3 + 1 2 ×

  • 1− 2

3

  • =

5 6 probability to pass is B(n,τ, 5

6)

(Chernoff) for τ

n > 5 6 +ε, this is less than e−2ε2n

SV 2013 distance bounding FSE 2013 45 / 48

slide-46
SLIDE 46

Summary

for pnoise < 1 6 − 2ε we can adjust τ and have completeness up to e−2ε2n, and security up to e−2ε2n completeness resistance to distance fraud resistance to mafia fraud resistance to terrorist fraud

SV 2013 distance bounding FSE 2013 46 / 48

slide-47
SLIDE 47

SKI Security

Theorem If f is a circular-keying secure PRF and V requires at least τ correct rounds, there is no DF with Pr[success] ≥ B(n,τ, 3

4)

there is no MiM with Pr[success] ≥ B(n,τ, 2

3)

for all CF such that Pr[CF succeeds] ≥ B( n

2,τ− n 2, 2 3)1−c there is

an assosiated MiM with P∗ such that Pr[MiM succeeds] ≥

  • 1− B( n

2,τ− n 2, 2 3)cn

B(n,τ,ρ) =

n

i=τ

n

i

  • ρi(1−ρ)n−i

SV 2013 distance bounding FSE 2013 47 / 48

slide-48
SLIDE 48

Conclusion

several proposed protocols from the literature are insecure several security proofs from the literature are incorrect SKI offers provable security

SV 2013 distance bounding FSE 2013 48 / 48