A general attack model on hash-based client puzzles

被引:0
|
作者
Price, G [1 ]
机构
[1] Univ London Royal Holloway & Bedford New Coll, Dept Math, Informat Secur Grp, Egham TW20 0EX, Surrey, England
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we present a general attack model against hash-based client puzzles. Our attack is generic in that it works against many published protocols. We introduce a new protocol and subsequently attack our new construction as well. We conclude by drawing two requirements of client puzzle protocols that would overcome our attack.
引用
下载
收藏
页码:319 / 331
页数:13
相关论文
共 50 条
  • [1] An Intermediate Secret-Guessing Attack on Hash-Based Signatures
    Booth, Roland
    Xu, Yanhong
    Karati, Sabyasachi
    Safavi-Naini, Reihaneh
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2021, 2021, 12835 : 195 - 215
  • [2] Generic Universal Forgery Attack on Iterative Hash-Based MACs
    Peyrin, Thomas
    Wang, Lei
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 147 - 164
  • [3] A General Way to Break Hash-based Challenge-and-Response
    Liu, Fanbao
    Chen, Yasha
    Dong, Yuan
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 59 - 62
  • [4] Hash-based signature revisited
    Lingyun Li
    Xianhui Lu
    Kunpeng Wang
    Cybersecurity, 5
  • [5] Denial-of-Service Vulnerability of Hash-Based Transaction Sharding: Attack and Countermeasure
    Nguyen, Truc
    Thai, My T.
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (03) : 641 - 652
  • [6] Hash-based encryption system
    Peyravian, M
    Roginsky, A
    Zunic, N
    COMPUTERS & SECURITY, 1999, 18 (04) : 345 - 350
  • [7] A Simple Attack on a Recently Introduced Hash-Based Secure User Authentication Scheme
    Kim, Minho
    Koc, Cetin Kaya
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 157 - 160
  • [8] Shorter hash-based signatures
    Pereira, Geovandro C. C. F.
    Puodzius, Cassius
    Barreto, Paulo S. L. M.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 116 : 95 - 100
  • [9] Hash-based IP traceback
    Snoeren, AC
    Partridge, C
    Sanchez, LA
    Jones, CE
    Tchakountio, F
    Kent, ST
    Strayer, WT
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2001, 31 (04) : 3 - 14
  • [10] Hash-based signature revisited
    Li, Lingyun
    Lu, Xianhui
    Wang, Kunpeng
    CYBERSECURITY, 2022, 5 (01)