Chaum’s Protocol for Detecting Man-in-the-middle: Explanation and Discussion
نویسندگان
چکیده
Title of thesis: CHAUM’S PROTOCOL FOR DETECTING MAN-IN-THE-MIDDLE: EXPLANATION AND DISCUSSION William Newton, Master of Computer Science, 2010 Thesis directed by: Dr. Alan T. Sherman Department of Computer Science In this research paper, I explain David Chaum’s patent that describes the Man-In-The-Middle (MITM) detection protocol. The MITM Detection Protocol (MDP) uses three stages to entrap an adversary that reveals her existence based on contextual information from each scenario. One of the primary goals of this research is to develop a detailed understanding of Chaum’s novel concept since the language describing the MDP presented a clouded explanation. My second goal is to re-describe the protocol using conventional notation and illustrations for two cases in each scenario, with and without an adversary. The explicit illustrations provided within this paper clearly define the exchange between two communicants and their ability to detect an adversary. I define the assumptions based around the common random string model that eliminates prior exchange of information and distribution of shared secrets. A discussion follows the explanation of the protocol which concludes that Chaum’s MDP adds technical value and merit towards achieving a MITM detection mechanism based on a restrictive assumption set; however, the elevated complexity experienced by the user contributed to the lack of integration and acceptance of the MDP onto existing hardware solutions.
منابع مشابه
A TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملSecurity Analysis of the Distance Bounding Protocol Proposed by Jannati and Falahati
In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. In addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...
متن کاملSome observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)
Over the last years, the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. Security and efficiency could be the main challenges of that communication. On the other hand, authenticity and confidentiality are two important goals to provide desired security in an information system, including IoT-based applications. An Authentication an...
متن کامل“Detecting Man in the Middle Attacks on Ephemeral Diffie-Hellman without Relying on a Public Key Infrastructure in Real-Time Communications”
With the recent revelations about pervasive surveillance on the Internet, there is renewed interest in techniques that protect against passive eavesdropping without relying on a Public Key Infrastructure (PKI). An ephemeral Diffie-Hellman (DH) key agreement can provide such protection, but (without authentication) the exchange is vulnerable to a Man in the Middle (MitM) attack. An example of a ...
متن کاملMan-in-the-Middle in Tunnelled Authentication Protocols (Discussion)
Deploying a new security protocol is expensive. This encourages system designers to look for ways of re-using existing infrastructure. When security protocols and components are re-used, it is critical to re-examine the security of the resulting system as a whole. For example, it has become a standard paradigm to run a legacy client authentication protocol within a secure tunnel. The commonest ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010