What are Multi-Protocol Guessing Attacks and How to Prevent Them
نویسندگان
چکیده
A guessing attack on a security protocol is an attack where an attacker guesses a poorly chosen secret (usually a low-entropy user password) and then seeks to verify that guess using other information. Past efforts to address guessing attacks in terms of design or analysis considered only protocols executed in isolation. However, security protocols are rarely executed in isolation and reality is always a case of mixed-protocols. In this paper, we introduce new types of attacks called multiprotocol guessing attacks, which can exist when protocols are mixed. We then develop a systematic procedure to analyze protocols subject to guessing attacks. Using this procedure, we will present a method of deriving some syntactic conditions to be followed in order for a protocol to be secure against multi-protocol guessing attacks. Lastly, we use the strand space framework to prove that a protocol will remain secure, given that these conditions are followed, by modeling the conditions within the strand space framework. We illustrate these concepts using the Mellovin and Berritt protocol (EKE) as an example.
منابع مشابه
Guess what? Here is a new tool that finds some new guessing attacks
" with a guess to get out, obtain in another way (possibly from a different message) and compare to verify the guess. Past efforts to address guessing attacks in terms of design or analysis always lacked a general definition and a general analysis approach for guessing attacks. Further, they always assumed that the protocols will be implemented without type-flaws and without interaction from ot...
متن کاملHow to prevent type-flaw guessing attacks on password protocols∗
A message in a protocol is said to have a type-flaw if it was created with some intended type, but is later received and treated as a different type. A type-flaw guessing attack is an attack where a password is guessed and verified by inducing type-flaws in a protocol. Heather et al. [HLS00] prove that attacks that use typeflaws can be prevented if honest agents tag messages with their intended...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملThe impact of 3-option responses to multiple-choice questions on guessing strategies and cut score determinations
Introduction: Research has asserted MCQ items using threeresponse options (one correct answer with two distractors) iscomparable to, and possibly preferable over, traditional MCQitem formats consisting of four response options (e.g., one correctanswer with three distractors), or five response options (e.g., onecorrect answer with four distractors). Some medical educatorshave also adopted the pr...
متن کاملA Formalization of Off-Line Guessing for Security Protocol Analysis
Guessing, or dictionary, attacks arise when an intruder exploits the fact that certain data like passwords may have low entropy, i.e. stem from a small set of values. In the case of off-line guessing, in particular, the intruder may employ guessed values to analyze the messages he has observed. Previous attempts at formalizing off-line guessing consist of extending a Dolev-Yao-style intruder mo...
متن کامل