A general attack model on hash-based client puzzles

被引:0
|
作者
Price, G [1 ]
机构
[1] Univ London Royal Holloway & Bedford New Coll, Dept Math, Informat Secur Grp, Egham TW20 0EX, Surrey, England
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we present a general attack model against hash-based client puzzles. Our attack is generic in that it works against many published protocols. We introduce a new protocol and subsequently attack our new construction as well. We conclude by drawing two requirements of client puzzle protocols that would overcome our attack.
引用
下载
收藏
页码:319 / 331
页数:13
相关论文
共 50 条
  • [21] Hash-based dynamic source routing
    Castelluccia, C
    Mutaf, P
    NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 1012 - 1023
  • [22] Robust hash-based image watermarking with resistance to geometric distortions and watermark-estimation attack
    Lu, CS
    Sun, SW
    Chang, PC
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VII, 2005, 5681 : 147 - 163
  • [23] Hash-Based TPM Signatures for the Quantum World
    Ando, Megumi
    Guttman, Joshua D.
    Papaleo, Alberto R.
    Scire, John
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 77 - 94
  • [24] Fast hash-based signatures on constrained devices
    Rohde, Sebastian
    Eisenbarth, Thomas
    Dahmen, Erik
    Buchmann, Johannes
    Paar, Christof
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2008, 5189 : 104 - +
  • [25] Analysis of a Proposed Hash-Based Signature Standard
    Katz, Jonathan
    SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 261 - 273
  • [26] A Comparison of Hash-Based Methods for Trajectory Clustering
    Rayatidamavandi, Maede
    Zhuang, Yu
    Rahnamay-Naeini, Mahshid
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 107 - 112
  • [27] A hash-based pseudonymization infrastructure for RFID systems
    Henrici, Dirk
    Goetze, Joachim
    Mueller, Paul
    SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 22 - +
  • [28] Hash-tree PCA: accelerating PCA with hash-based grouping
    Lkhagvadorj Battulga
    Sang-Hyun Lee
    Aziz Nasridinov
    Kwan-Hee Yoo
    The Journal of Supercomputing, 2020, 76 : 8248 - 8264
  • [29] Faster Hash-Based Signatures with Bounded Leakage
    Eisenbarth, Thomas
    von Maurich, Ingo
    Ye, Xin
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 223 - 243
  • [30] Metagenome sequence clustering with hash-based canopies
    Rahman, Mohammad Arifur
    LaPierre, Nathan
    Rangwala, Huzefa
    Barbara, Daniel
    JOURNAL OF BIOINFORMATICS AND COMPUTATIONAL BIOLOGY, 2017, 15 (06)