2012
DOI: 10.1007/978-3-642-33481-8_6
|View full text |Cite
|
Sign up to set email alerts
|

On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols

Abstract: Abstract. In this paper, we show that many formal and informal security results on distance-bounding (DB) protocols are incorrect/ incomplete. We identify that this inadequacy stems from the fact that the pseudorandom function (PRF) assumption alone, invoked in many security claims, is insufficient. To this end, we identify two distinct shortcomings of invoking the PRF assumption alone: one leads to distance-fraud attacks, whilst the other opens for man-in-the-middle (MiM) attacks. First, we describe -in a mor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
44
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6

Relationship

4
2

Authors

Journals

citations
Cited by 26 publications
(44 citation statements)
references
References 11 publications
0
44
0
Order By: Relevance
“…Table 1 gives the probability of success of the best known attacks. This table does not consider possibly bad pseudorandom function (PRF) instances [5] nor any terrorist fraud based on noise tolerance [19]. These aspects will be discussed later in the present paper.…”
Section: Why Distance-bounding?mentioning
confidence: 99%
See 4 more Smart Citations
“…Table 1 gives the probability of success of the best known attacks. This table does not consider possibly bad pseudorandom function (PRF) instances [5] nor any terrorist fraud based on noise tolerance [19]. These aspects will be discussed later in the present paper.…”
Section: Why Distance-bounding?mentioning
confidence: 99%
“…2 which we call DBENC in [5]. Here, only a 1 is derived from the initial nonces and a 2 is set to a 1 ⊕ x.…”
Section: Towards a Secure Protocolmentioning
confidence: 99%
See 3 more Smart Citations