2016 International Conference on Localization and GNSS (ICL-GNSS) 2016
DOI: 10.1109/icl-gnss.2016.7533685
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating the security of one-way key chains in TESLA-based GNSS Navigation Message Authentication schemes

Abstract: In the proposals for Global Navigation Satellite Systems (GNSS) Navigation Message Authentication (NMA) that are based on adapting the Timed Efficient Stream Loss-Tolerant Authentication (TESLA) protocol, the length of the one-time keys is limited (e.g. to 80 bits) by the low transmission rate. As a consequence, the hash function that is used to build the one-way key chain is constructed having a longer, secure hash function (e.g. SHA-256), preceded by a time-varying yet deterministic padding of the input and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
32
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 26 publications
(35 citation statements)
references
References 4 publications
3
32
0
Order By: Relevance
“…TESLA is widely used to authenticate broadcast messages [31,32], such as DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things [33]. We first present an overview of TESLA by outlining properties that make TESLA suitable for securing PLC for load management systems.…”
Section: Timed Efficient Stream Loss-tolerant Authentication (Tesla)mentioning
confidence: 99%
“…TESLA is widely used to authenticate broadcast messages [31,32], such as DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things [33]. We first present an overview of TESLA by outlining properties that make TESLA suitable for securing PLC for load management systems.…”
Section: Timed Efficient Stream Loss-tolerant Authentication (Tesla)mentioning
confidence: 99%
“…This characteristic of being deterministic offers receivers the ability to recover the keychain in the event that messages are lost, but it also allows attackers the ability to carry out pre-computation attacks. The addition of a "salt", or cryptographic randomness, to the key creation process has been proposed in previous literature [5][7] [8]. This salt can come in the form of incorporating a time-varying hash function that changes with each iteration of key creation in the keychain.…”
Section: Ii: the Tesla Algorithmmentioning
confidence: 99%
“…The keys in the keychain will be derived from this one-way function by truncating the output of the hash to create each key. In [5], it was pointed out that one needs to be careful when truncating the output of the SHA256 function to create the keychain. A pre-image or second pre-image becomes more likely to be found as the amount of truncation increases.…”
Section: Iii: Probabilistic Attack Model For Tesla Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Both symmetric and asymmetric algorithms have been proposed as digital authentication methods for GNSS and SBAS, and both sets of algorithms are built upon primitives that are assumed to be hard to break. For asymmetric algorithms, the primitive discussed here is the digital signature based on the discrete logarithm, and for symmetric algorithms, it is the one‐way hash function.…”
Section: Introductionmentioning
confidence: 99%