35 research outputs found
Security of two recent constant-round password authenticated group key exchange schemes
When humans interact with machines in their daily networks, it is important that security of the communications is offered, and where the involved shared secrets used to achieve this are easily remembered by humans. Password-based authenticated group key exchange (PAGKE) schemes allow group users to share a session key based on a human-memorizable password. In this paper, we consider two PAGKE schemes that build on the seminal scheme of Burmester and Desmedt. Weshow an undetectable online dictionary attack on the first scheme, and exploit the partnering definition to break the key indistinguishability of the second scheme
Fixing the integrated Diffie-Hellman-DSA key exchange protocol
Recently, three key exchange protocols were proposed that integrated the Diffie-Hellman key exchange into the digital signature algorithm (DSA). It was claimed that the protocols provide known-key security and unknown key-share resilience, while the most advanced variant also provides key-replay resilience. However, we show in this paper that the protocols do not provide forward secrecy and key freshness which are two of the standard security attributes that key exchange protocols should have. We also fix the protocols such that they provide these security attributes
Security limitations of an authorized anonymous ID-based scheme for mobile communication
In this article we discuss the security limitations of a recently proposed authorized anonymous ID-based scheme for mobile communications due to He et al. We present three example attacks an attacker could mount on the scheme, point out the weaknesses we exploited, and suggest how to counter them. Our attacks are variants of the replay attack to which any security scheme should be resistant. Such attacks are easy to mount since they simply require replaying previous valid messages, and are often passive attacks and thus hard to detect. Therefore, our results are devastating since they show that the scheme has failed to achieve its main objective of establishing mutual authentication between legitimate parties
Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI
Since RFID tags are ubiquitous and at times even oblivious to the
human user, all modern RFID protocols are designed to resist tracking so that the
location privacy of the human RFID user is not violated. Another design criterion
for RFIDs is the low computational effort required for tags, in view that most tags
are passive devices that derive power from an RFID reader’s signals. Along this
vein, a class of ultralightweight RFID authentication protocols has been designed,
which uses only the most basic bitwise and arithmetic operations like exclusive-
OR, OR, addition, rotation, and so forth. In this paper, we analyze the security of
the SASI protocol, a recently proposed ultralightweight RFID protocol with better
claimed security than earlier protocols. We show that SASI does not achieve
resistance to tracking, which is one of its design objectives
Non-repudiable authentication and billing architecture for wireless mesh networks
Wireless mesh networks (WMNs) are a kind of wireless ad hoc networks
that are multi-hop where packets are forwarded from source to destination
by intermediate notes as well as routers that form a kind of network infrastructure
backbone. We investigate the security of the recently proposed first known secure
authentication and billing architecture for WMNs which eliminates the need for
bilateral roaming agreements and that for traditional home-foreign domains. We
show that this architecture does not securely provide incontestable billing contrary
to designer claims and furthermore it does not achieve entity authentication. We
then present an enhanced scheme that achieves entity authentication and nonrepudiable
billing
Tampering with a watermarking-based image authentication scheme
We analyse a recent image authentication scheme designed by Chang et al. [A watermarking-based image ownership and tampering authentication scheme, Pattern Recognition Lett. 27 (5) (2006) 439–446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Lossless compression and information hiding in images, Pattern Recognition 37 (3) (2004) 475–486]. We show how the Chang et al. scheme still allows pixels to be tampered, and furthermore discuss why its ownership cannot be uniquely binding. Our results indicate that the scheme does not achieve its designed objectives of tamper detection and image ownership
Security of Group Key Exchange Protocols with Different Passwords
Password-based authenticated group key exchange protocols allow group users to jointly share a session key based on a human-memorizable password. In this paper, we present an undetectable online dictionary attack on N-EKE-D, a recent provably secure protocol designed to explicitly resist this type of attack. Thus, our result contradicts the design goal. We also give a simple attack on the key indistinguishability of N-EKE-D and two N-EKE-M variants that exploits the definition of partnering in their security model
On hashing with tweakable ciphers
Cryptographic hash functions are often built on block ciphers in order to reduce the security analysis of the hash to that of the cipher, and to minimize the hardware size. Well known hash constructs are used in international standards like MD5 and SHA-1. Recently, researchers proposed new modes of operations for hash functions to protect against generic attacks, and it remains open how to base such functions on block ciphers. An attracting and intuitive choice is to combine previous constructions with tweakable block ciphers. We investigate such constructions, and show the surprising result that combining a provably secure mode of operation with a provably secure tweakable cipher does not guarantee the security of the constructed hash function. In fact, simple attacks can be possible when the interaction between secure components leaves some additional "freedom" to an adversary. Our techniques are derived from the principle of slide attacks, which were introduced for attacking block ciphers
Analyzing the secure simple pairing in Bluetooth v4.0
This paper analyzes the security of Bluetooth v4.0’s Secure Simple Pairing
(SSP) protocol, for both the Bluetooth Basic Rate / Enhanced Data Rate (BR/EDR)
and Bluetooth Low Energy (LE) operational modes. Bluetooth v4.0 is the latest version
of a wireless communication standard for low-speed and low-range data transfer among
devices in a human’s PAN. It allows increased network mobility among devices such
as headsets, PDAs, wireless keyboards and mice. A pairing process is initiated when
two devices desire to communicate, and this pairing needs to correctly authenticate
devices so that a secret link key is established for secure communication. What is
interesting is that device authentication relies on humans to communicate verification
information between devices via a human-aided out-of-band channel. Bluetooth v4.0’s
SSP protocol is designed to offer security against passive eavesdropping and man-inthe-
middle (MitM) attacks. We conduct the first known detailed analysis of SSP for all
its MitM-secure models. We highlight some issues related to exchange of public keys
and use of the passkey in its models and discuss how to treat them properly
Attacks on improved key distribution protocols with perfect reparability
In this paper, we present attacks on two improved key distribution protocol with perfect reparability that were presented at ICON 2000. First, we show that the two ldquoattacksrdquo described in their paper are trivial and do not count as attacks at all since they are well-known attacks that apply to any security system. Further, we describe several attacks on both improved protocols, and show that an illegitimate attacker could easily impersonate legitimate parties and have other parties think they are sharing keys with the impersonated party when in fact that party is not present at all