Proceedings of the 2011 ACM Symposium on Applied Computing 2011
DOI: 10.1145/1982185.1982508
|View full text |Cite
|
Sign up to set email alerts
|

On the (im)possibility of perennial message recognition protocols without public-key cryptography

Abstract: A message recognition protocol (MRP) aims to exchange authenticated information in an insecure channel. During the initialization session of the protocol, the parties exchange some authenticated information which the adversary can passively observe. Then, one party wants to send authenticated messages to the other party over an insecure channel. Such security requirements are often found in wireless sensor networks.A perennial MRP is one that is able to recover from the adversarial interference, no matter how … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…The security analysis shows that this scheme is secure against the known attacks for authentication protocols including replay and man-in-themiddle attacks. However, González Muñiz and Laud stated that symmetric-key techniques were not enough to construct message recognition protocols in [284]. Moreover, the authors also presented a very strong evidence that Message Recognition Protocols (MRPs) cannot be built from "cheap" primitives using only hash functions and XORing.…”
Section: Robotic System's: Identification Verification and Authenticmentioning
confidence: 99%
“…The security analysis shows that this scheme is secure against the known attacks for authentication protocols including replay and man-in-themiddle attacks. However, González Muñiz and Laud stated that symmetric-key techniques were not enough to construct message recognition protocols in [284]. Moreover, the authors also presented a very strong evidence that Message Recognition Protocols (MRPs) cannot be built from "cheap" primitives using only hash functions and XORing.…”
Section: Robotic System's: Identification Verification and Authenticmentioning
confidence: 99%
“…This can hinder the generalization of certain kinds of results. For example, as stated, the impossibility result of [13] only applies to hash functions and XOR operations.…”
Section: Introductionmentioning
confidence: 99%
“…The technique does not require the prover to universally quantify over processes and contexts, but just provide an observationally equivalent process to a specific, the "most powerful" attacker against processes using the implementation of the primitive. We apply the technique by providing a secure implementation for the randomized symmetric encryption primitive in terms of one-way hash functions and exclusive or, thereby generalizing our impossibility result [13].…”
Section: Introductionmentioning
confidence: 99%