Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks

نویسندگان

  • Hassan Jameel Asghar
  • Shujun Li
  • Ron Steinfeld
  • Josef Pieprzyk
چکیده

At NDSS 2012, Yan et al. analyzed the security of sev-eral challenge-response type user authentication protocolsagainst passive observers, and proposed a generic countingbased statistical attack to recover the secret of some count-ing based protocols given a number of observed authentica-tion sessions. Roughly speaking, the attack is based on thefact that secret (pass) objects appear in challenges with adifferent probability from non-secret (decoy) objects whenthe responses are taken into account. Although they men-tioned that a protocol susceptible to this attack should min-imize this difference, they did not give details as to how thiscan be achieved barring a few suggestions. In this paper,we attempt to fill this gap by generalizing the attack with amuch more comprehensive theoretical analysis. Our treat-ment is more quantitative which enables us to describe amethod to theoretically estimate a lower bound on the num-ber of sessions a protocol can be safely used against theattack. Our results include 1) two proposed fixes to makecounting protocols practically safe against the attack at thecost of usability, 2) the observation that the attack can beused on non-counting based protocols too as long as chal-lenge generation is contrived, 3) and two main design prin-ciples for user authentication protocols which can be con-sidered as extensions of the principles from Yan et al. This∗This is the full version of the paper with the same title which is toappear in the Proceedings of the Network & Distributed System SecuritySymposium (NDSS) 2013.detailed theoretical treatment can be used as a guidelineduring the design of counting based protocols to determinetheir susceptibility to this attack. The Foxtail protocol, oneof the protocols analyzed by Yan et al., is used as a represen-tative to illustrate our theoretical and experimental results.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

On the security of RFID anti-counting security protocol (ACSP)

Recently Qian et al. [38] have proposed a new attack for RFID systems, called counting attack, where the attacker just aims to estimate the number of tagged objects instead of steal the tags’ private information. They have stated that most of the existing RFID mutual authentication protocols are vulnerable to this attack. To defend against counting attack, they propose a novel Anti-Counting Sec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2012  شماره 

صفحات  -

تاریخ انتشار 2012