Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Journal articles
  4. On Selecting the Nonce Length in Distance-Bounding Protocols
 
research article

On Selecting the Nonce Length in Distance-Bounding Protocols

Mitrokotsa, Aikaterini  
•
Peris-Lopez, Pedro
•
Dimitrakakis, Christos
Show more
2013
Computer Journal

Distance-bounding protocols form a family of challenge-response authentication protocols that have been introduced to thwart relay attacks. They enable a verifier to authenticate and to establish an upper bound on the physical distance to an untrusted prover. We provide a detailed security analysis of a family of such protocols. More precisely, we show that the secret key shared between the verifier and the prover can be leaked after a number of nonce repetitions. The leakage probability, while exponentially decreasing with the nonce length, is only weakly dependent on the key length. Our main contribution is a high probability bound on the number of sessions required for the attacker to discover the secret, and an experimental analysis of the attack under noisy conditions. Both of these show that the attack's success probability mainly depends on the length of the used nonces rather than the length of the shared secret key. The theoretical bound could be used by practitioners to appropriately select their security parameters. While longer nonces can guard against this type of attack, we provide a possible countermeasure which successfully combats these attacks even when short nonces are used.

  • Files
  • Details
  • Metrics
Type
research article
DOI
10.1093/comjnl/bxt033
Web of Science ID

WOS:000325489800007

Author(s)
Mitrokotsa, Aikaterini  
Peris-Lopez, Pedro
Dimitrakakis, Christos
Vaudenay, Serge  
Date Issued

2013

Publisher

Oxford University Press

Published in
Computer Journal
Volume

56

Issue

10

Start page

1216

End page

1227

Subjects

RFID

•

distance-bounding protocols

•

relay attacks

•

high probability bounds

•

cryptanalysis

Note

National Licences

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LASEC  
LIA  
Available on Infoscience
December 9, 2013
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/97752
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés