On Selecting the Nonce Length in Distance-Bounding Protocols

被引:9
作者
Mitrokotsa, Aikaterini [1 ,2 ]
Peris-Lopez, Pedro [3 ]
Dimitrakakis, Christos [1 ]
Vaudenay, Serge [1 ]
机构
[1] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
[2] Univ Appl Sci Western Switzerland HES SO, Geneva, Switzerland
[3] Univ Carlos III Madrid, Madrid, Spain
关键词
RFID; distance-bounding protocols; relay attacks; high probability bounds; cryptanalysis; ATTACKS;
D O I
10.1093/comjnl/bxt033
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Distance-bounding protocols form a family of challenge-response authentication protocols that have been introduced to thwart relay attacks. They enable a verifier to authenticate and to establish an upper bound on the physical distance to an untrusted prover. We provide a detailed security analysis of a family of such protocols. More precisely, we show that the secret key shared between the verifier and the prover can be leaked after a number of nonce repetitions. The leakage probability, while exponentially decreasing with the nonce length, is only weakly dependent on the key length. Our main contribution is a high probability bound on the number of sessions required for the attacker to discover the secret, and an experimental analysis of the attack under noisy conditions. Both of these show that the attack's success probability mainly depends on the length of the used nonces rather than the length of the shared secret key. The theoretical bound could be used by practitioners to appropriately select their security parameters. While longer nonces can guard against this type of attack, we provide a possible countermeasure which successfully combats these attacks even when short nonces are used.
引用
收藏
页码:1216 / 1227
页数:12
相关论文
共 50 条
[41]   Bounding the length of impossible differentials for SPN block ciphers [J].
Wang, Qian ;
Jin, Chenhui .
DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (11) :2477-2493
[42]   A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions [J].
Kardas, Suleyman ;
Kiraz, Mehmet Sabir ;
Bingol, Muhammed Ali ;
Demirci, Huseyin .
RFID SECURITY AND PRIVACY, 2012, 7055 :78-93
[43]   RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks [J].
Kim, Chong Hee ;
Avoine, Gildas .
CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 :119-133
[44]   MEED: A Memory-efficient Distance Bounding Protocol with Error Detection [J].
Xin, Wei ;
Tang, Cong ;
Xiong, Hu ;
Wang, Yonggang ;
Sun, Huiping ;
Guan, Zhi ;
Chen, Zhong .
RADIO FREQUENCY IDENTIFICATION SYSTEM SECURITY (RFIDSEC'11), 2011, 6 :129-143
[45]   On the Use of m-Ary Challenges for RFID Distance Bounding Protocol [J].
Kim, Young-Sik ;
Kim, Sang-Hyo .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2016, E99B (09) :2028-2035
[46]   HB+DB: Distance bounding meets human based authentication [J].
Pagnin, Elena ;
Yang, Anjia ;
Hu, Qiao ;
Hancke, Gerhard ;
Mitrokotsa, Aikaterini .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 :627-639
[47]   Towards More Security Distance Bounding Protocol to prevent relay attacks [J].
Zhou, Jingxian ;
Xiao, Feng ;
Gu, Zhaojun .
PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 :1741-1748
[48]   A FMCW-Based Cross Layer RF Distance Bounding Scheme [J].
Lu, Li ;
Hussain, Muhammad Jawad ;
Han, Zhigang .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (06) :4009-4016
[49]   A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions [J].
Kardas, Suleyman ;
Kiraz, Mehmet Sabir ;
Bingol, Muhammed Ali ;
Demirci, Huseyin .
RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 :78-93
[50]   A general and efficient distance bounding protocol with multi-objective optimisation for RFID applications over a noisy channel [J].
Shafiee, Ebrahim ;
Falahati, Abolfazl .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2021, 38 (04) :248-262