Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation

نویسندگان

  • Ronald Cramer
  • Ivan Damgård
چکیده

We present a simple method for constructing identiication schemes resilient against impersonation and man-in-the-middle attacks. Though zero-knowledge or witness hiding protocols are known to withstand attacks of the rst kind, all such protocols previously proposed suuer from a weakness observed by Bengio et al. : a malicious veriier may simply act as a moderator between the prover and yet another ver-iier, thus enabling the malicious veriier to pass as the prover. We exhibit a general class of identiication schemes that can be ee-ciently and securely tranformed into identiication schemes withstanding an adaptive man-in-the-middle attacker. The complexity of the resulting (witness hiding) schemes is roughly twice that of the originals. Basically, any three-move, public coin identiication scheme that is zero knowledge against the honest veriier and that is secure against passive impersonation attacks, is eligible for our transformation. This indicates that we need only seemlingly weak cryptographic intractability assumptions to construct a practical identiication scheme resisting adative man-in-the-middle impersonation attacks. Moreover, the required primitive protocols can eeciently be constructed under the factoring or discrete logarithm assumptions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum password authentication against man-in-the-middle attack

Authentication with recently proposed quantum password protocol is secure against impersonation. Here we show that original version of the protocol is not secure against active malicious prover and verifier, however a slight modification provides a possibility for a legitimate party to detect the attacks. The password is reusable in the absence of the attacks. Otherwise the security of the auth...

متن کامل

An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications

Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed ...

متن کامل

On the Security of 'An Efficient Biometric Authentication Protocol for Wireless Sensor Networks'

In 2013, Althobaiti et al. proposed an efficient biometricbased user authentication scheme for wireless sensor networks. We analyze their scheme for the security against known attacks. Though their scheme is efficient in computation, in this paper we show that their scheme has some security pitfalls such as (1) it is not resilient against node capture attack, (2) it is insecure against imperson...

متن کامل

Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings

In 2005, Wen et al. proposed the first provably secure three-party password-based authenticated key exchange using Weil pairings, and provided their proof in a modified Bellare-Rogaway model (BR-model). Here, we show an impersonation attack on Wen et al.’s scheme and point out a main flaw of their model that allows a man-in-the-middle adversary easily violate the security.

متن کامل

Quantum Cryptography : Security analyses of multiuser quantum communication with embedded authentication

Three quantum cryptographic protocols of multiuser quantum networks with embedded authentication, allowing quantum key distribution or quantum direct communication, are discussed in this work (Hong et al., 2006, Lee et al., 2005, 2006). The security of the protocols against different types of attacks is analysed with a focus on various impersonation attacks and the man-in-the-middle attack. On ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997