Distance-bounding protocols form a family of challenge-response authentication protocols that have been introduced to thwart relay attacks. They enable a verifier to authenticate and to establish an upper bound on the physical distance to an untrusted prover. We provide a detailed security analysis of a family of such protocols. More precisely, we show that the secret key shared between the verifier and the prover can be leaked after a number of nonce repetitions. The leakage probability, while exponentially decreasing with the nonce length, is only weakly dependent on the key length. Our main contribution is a high probability bound on the number of sessions required for the attacker to discover the secret, and an experimental analysis of ...
International audienceDistance-bounding protocols have been introduced to thwart relay attacks again...
Distance bounding protocols are an effective countermeasure against relay attacks including distance...
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as 'm...
Distance-bounding protocols form a family of challenge–response authentication protocols that have b...
Distance-bounding protocols form a family of challenge–response authentication protocols that havebe...
Distance-bounding protocols prevent man-in-the-middle attacks by measuring response times. Recently,...
peer reviewedDistance-bounding protocols serve to thwart various types of proximity-based attacks, s...
peer reviewedDistance-bounding protocols serve to thwart various types of proximity-based attacks, s...
Distance-bounding is a practical solution to be used in security-sensitive contexts, mainly to preve...
Distance Bounding (DB) is designed to mitigate relay attacks. This paper provides a complete study o...
Distance-bounding protocols serve to thwart various types of proximity-based attacks, such as relay ...
Distance bounding protocols are an effective countermeasure against relay attacks including distance...
International audienceDistance-bounding protocols have been introduced to thwart relay attacks again...
International audienceDistance-bounding protocols have been introduced to thwart relay attacks again...
International audienceContactless communications have become omnipresent in our daily lives, from si...
International audienceDistance-bounding protocols have been introduced to thwart relay attacks again...
Distance bounding protocols are an effective countermeasure against relay attacks including distance...
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as 'm...
Distance-bounding protocols form a family of challenge–response authentication protocols that have b...
Distance-bounding protocols form a family of challenge–response authentication protocols that havebe...
Distance-bounding protocols prevent man-in-the-middle attacks by measuring response times. Recently,...
peer reviewedDistance-bounding protocols serve to thwart various types of proximity-based attacks, s...
peer reviewedDistance-bounding protocols serve to thwart various types of proximity-based attacks, s...
Distance-bounding is a practical solution to be used in security-sensitive contexts, mainly to preve...
Distance Bounding (DB) is designed to mitigate relay attacks. This paper provides a complete study o...
Distance-bounding protocols serve to thwart various types of proximity-based attacks, such as relay ...
Distance bounding protocols are an effective countermeasure against relay attacks including distance...
International audienceDistance-bounding protocols have been introduced to thwart relay attacks again...
International audienceDistance-bounding protocols have been introduced to thwart relay attacks again...
International audienceContactless communications have become omnipresent in our daily lives, from si...
International audienceDistance-bounding protocols have been introduced to thwart relay attacks again...
Distance bounding protocols are an effective countermeasure against relay attacks including distance...
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as 'm...