Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing

被引:12
|
作者
Pietrzak, Krzysztof [1 ]
机构
[1] IST Austria, Klosterneuburg, Austria
来源
基金
欧洲研究理事会;
关键词
D O I
10.1007/978-3-030-65277-7_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently several projects aim at designing and implementing protocols for privacy preserving automated contact tracing to help fight the current pandemic. Those proposal are quite similar, and in their most basic form basically propose an app for mobile phones which broadcasts frequently changing pseudorandom identifiers via (low energy) Bluetooth, and at the same time, the app stores IDs broadcast by phones in its proximity. Only if a user is tested positive, they upload either the beacons they did broadcast (which is the case in decentralized proposals as DP-3T, east and west coast PACT or Covid watch) or received (as in Popp-PT or ROBERT) during the last two weeks or so. Vaudenay [eprint 2020/399] observes that this basic scheme (he considers the DP-3T proposal) succumbs to relay and even replay attacks, and proposes more complex interactive schemes which prevent those attacks without giving up too many privacy aspects. Unfortunately interaction is problematic for this application for efficiency and security reasons. The countermeasures that have been suggested so far are either not practical or give up on key privacy aspects. We propose a simple non-interactive variant of the basic protocol that - (security) Provably prevents replay and (if location data is available) relay attacks. - (privacy) The data of all parties (even jointly) reveals no information on the location or time where encounters happened. - (efficiency) The broadcasted message can fit into 128 bits and uses only basic crypto (commitments and secret key authentication). Towards this end we introduce the concept of "delayed authentication", which basically is a message authentication code where verification can be done in two steps, where the first doesn't require the key, and the second doesn't require the message.
引用
收藏
页码:3 / 15
页数:13
相关论文
共 50 条
  • [1] Design of Authentication Protocols Preventing Replay Attacks
    Li, Junhong
    [J]. 2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 362 - 365
  • [2] Algebraic Replay Attacks on Authentication in RFID Protocols
    Chikouche, Noureddine
    Cherif, Foudil
    Benmohammed, Mohamed
    [J]. ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 153 - +
  • [3] Preventing Replay Attacks on Speaker Verification Systems
    Villalba, Jesus
    Lleida, Eduardo
    [J]. 2011 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2011,
  • [4] Relay attacks on Bluetooth authentication and solutions
    Levi, A
    Çetintas, E
    Aydos, M
    Koç, ÇK
    Çaglayan, MU
    [J]. COMPUTER AND INFORMATION SCIENCES - ISCIS 2004, PROCEEDINGS, 2004, 3280 : 278 - 288
  • [5] Securing PKES against Relay Attacks using Coordinate Tracing and Multi-Factor Authentication
    Rizvi, Syed
    Imler, Jarrett
    Ritchey, Luke
    Tokar, Michael
    [J]. 2019 53RD ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2019,
  • [6] Preventing replay attacks for secure routing in ad hoc networks
    Zhen, J
    Srinivas, S
    [J]. AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2003, 2865 : 140 - 150
  • [7] Shared authentication token secure against replay and weak key attacks
    Yen, SM
    Liao, KH
    [J]. INFORMATION PROCESSING LETTERS, 1997, 62 (02) : 77 - 80
  • [8] Permutation-Based Biometric Authentication Protocols for Mitigating Replay Attacks
    Shelton, Joseph
    Dozier, Gerry
    Adams, Joshua
    Alford, Aniesha
    [J]. 2012 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2012,
  • [9] Modified RAP-WOTA for Preventing Man in the Middle and Replay Attacks
    Syafrilah, Zianita
    Permana, Anang Adi
    Handayani, Annisa Dini
    [J]. 2019 4TH INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2019), 2019, : 73 - 78
  • [10] PIVOT: Private and Effective Contact Tracing
    Garofalo, Giuseppe
    Van Hamme, Tim
    Preuveneers, Davy
    Joosen, Wouter
    Abidin, Aysajan
    Mustafa, Mustafa A.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22): : 22466 - 22489