Security

Provably Secure Distance-Bounding: An Analysis of Prominent Protocols

Download Now Free registration required

Executive Summary

Distance-bounding protocols aim to prevent man-in-the-middle attacks by measuring response times. At ISC 2011, Durholz et al. formalized the four attacks such protocols typically address: mafia attacks, where the adversary must impersonate to a verifier in the presence of an honest prover, terrorist attacks, where the adversary gets limited offline support from the prover for the impersonation, distance fraud attacks, where provers claim to be closer to verifiers than they really are, and impersonation security, where adversaries try to impersonate the provers in lazy protocol phases.

  • Format: PDF
  • Size: 226.22 KB