On Selecting the Nonce Length in Distance-Bounding Protocols

被引:9
作者
Mitrokotsa, Aikaterini [1 ,2 ]
Peris-Lopez, Pedro [3 ]
Dimitrakakis, Christos [1 ]
Vaudenay, Serge [1 ]
机构
[1] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
[2] Univ Appl Sci Western Switzerland HES SO, Geneva, Switzerland
[3] Univ Carlos III Madrid, Madrid, Spain
关键词
RFID; distance-bounding protocols; relay attacks; high probability bounds; cryptanalysis; ATTACKS;
D O I
10.1093/comjnl/bxt033
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Distance-bounding protocols form a family of challenge-response authentication protocols that have been introduced to thwart relay attacks. They enable a verifier to authenticate and to establish an upper bound on the physical distance to an untrusted prover. We provide a detailed security analysis of a family of such protocols. More precisely, we show that the secret key shared between the verifier and the prover can be leaked after a number of nonce repetitions. The leakage probability, while exponentially decreasing with the nonce length, is only weakly dependent on the key length. Our main contribution is a high probability bound on the number of sessions required for the attacker to discover the secret, and an experimental analysis of the attack under noisy conditions. Both of these show that the attack's success probability mainly depends on the length of the used nonces rather than the length of the shared secret key. The theoretical bound could be used by practitioners to appropriately select their security parameters. While longer nonces can guard against this type of attack, we provide a possible countermeasure which successfully combats these attacks even when short nonces are used.
引用
收藏
页码:1216 / 1227
页数:12
相关论文
共 50 条
  • [1] Security Analysis of Two Distance-Bounding Protocols
    Abyaneh, Mohammad Reza Sohizadeh
    RFID SECURITY AND PRIVACY, 2012, 7055 : 94 - 107
  • [2] Security Analysis of Two Distance-Bounding Protocols
    Abyaneh, Mohammad Reza Sohizadeh
    RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 94 - 107
  • [3] A Formal Approach to Distance-Bounding RFID Protocols
    Duerholz, Ulrich
    Fischlin, Marc
    Kasper, Michael
    Onete, Cristina
    INFORMATION SECURITY, 2011, 7001 : 47 - +
  • [4] Security of Distance-Bounding: A Survey
    Avoine, Gildas
    Bingol, Muhammed Ali
    Boureanu, Ioana
    Capkun, Srdjan
    Hancke, Gerhard
    Kardas, Suleyman
    Kim, Chong Hee
    Lauradoux, Cedric
    Martin, Benjamin
    Munilla, Jorge
    Peinado, Alberto
    Rasmussen, Kasper Bonne
    Singelee, Dave
    Tchamkerten, Aslan
    Trujillo-Rasua, Rolando
    Vaudenay, Serge
    ACM COMPUTING SURVEYS, 2019, 51 (05)
  • [5] Privacy failure in the public-key distance-bounding protocols
    Vaudenay, Serge
    IET INFORMATION SECURITY, 2016, 10 (04) : 188 - 193
  • [6] The Poulidor Distance-Bounding Protocol
    Trujillo-Rasua, Rolando
    Martin, Benjamin
    Avoine, Gildas
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 239 - +
  • [7] Design of a secure distance-bounding channel for RFID
    Hancke, G. P.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (03) : 877 - 887
  • [8] Performing and mitigating force and terrorist fraud attacks against two RFID distance-bounding protocols
    Rad, Azadeh Imani
    Alagheband, Mahdi R.
    Far, Saeed Banaeian
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 42 : 87 - 94
  • [9] Yet another secure distance-bounding protocol
    Nikov, Ventzislav
    Vauclair, Marc
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 218 - 221
  • [10] Practical and provably secure distance-bounding
    Boureanu, Ioana
    Mitrokotsa, Aikaterini
    Vaudenay, Serge
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (02) : 229 - 257