a primer on relay attacks and distance-bounding protocols · 2018. 5. 29. · objective of distance...

27
A Primer on Relay Attacks and Distance-bounding Protocols Gildas Avoine Univ Rennes, INSA Rennes, CNRS Institut Universitaire de France

Upload: others

Post on 18-Sep-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

A Primer on Relay Attacks andDistance-bounding Protocols

Gildas Avoine

Univ Rennes, INSA Rennes, CNRS

Institut Universitaire de France

Page 2: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

SUMMARY

Relay Attacks

Distance Bounding Protocols

From Theory to Practice

Conclusion

Page 3: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

RELAY ATTACKS

Relay Attacks

Distance Bounding Protocols

From Theory to Practice

Conclusion

Page 4: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

Chess Grandmaster Problem (Conway 1976)

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 4/24

Page 5: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

Cheat During Chess Games (Chess Olympiad 2010)

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 5/24

Page 6: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

ISO 9798-2 Protocol 3 (Variant)

Verifier (secret k) Prover (secret k)

Pick NaNa−−−−−−−−−→

Ek (Na,Nb)←−−−−−−−− Pick Nb

Protocol secure under common assumptions on E , k , Na, and Nb.

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 6/24

Page 7: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

Relay Attack

Definition (Relay Attack)

A relay attack is a form of man-in-the-middle where the adversarymanipulates the communication by only relaying the verbatimmessages between two parties.

Comment

Desmedt, Goutier, and Bengio [Desmedt et al. 1988] extended thisconcept to security protocols in 1987, with an attack on theFiat-Shamir protocol [Fiat and Shamir 1986; Feige et al. 1987].

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 7/24

Page 8: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

Relay Attack

Definition (Relay Attack)

A relay attack is a form of man-in-the-middle where the adversarymanipulates the communication by only relaying the verbatimmessages between two parties.

Comment

Desmedt, Goutier, and Bengio [Desmedt et al. 1988] extended thisconcept to security protocols in 1987, with an attack on theFiat-Shamir protocol [Fiat and Shamir 1986; Feige et al. 1987].

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 7/24

Page 9: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

Relay Attack

Definition (Relay Attack)

A relay attack is a form of man-in-the-middle where the adversarymanipulates the communication by only relaying the verbatimmessages between two parties.

Comment

Desmedt, Goutier, and Bengio [Desmedt et al. 1988] extended thisconcept to security protocols in 1987, with an attack on theFiat-Shamir protocol [Fiat and Shamir 1986; Feige et al. 1987].

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 7/24

Page 10: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

Experimental Results

Radio link over 50 meters (G. Hancke, IEEE SSP 2006).

Attacks by Francillon, Danev, Capkun (ETHZ) against keylessentry and start systems used in modern cars (NDSSS 2011).

Implementation in libNFC. Implementations for smartphones.

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 8/24

Page 11: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

Off-the-Shelf Devices

www.bundpol.com

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 9/24

Page 12: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

Scenarios

Payment (e.g., in the lockers of a swimming pool)

Access control

Digital right management (DRM)

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 10/24

Page 13: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

DISTANCE BOUNDING PROTOCOLS

Relay Attacks

Distance Bounding Protocols

From Theory to Practice

Conclusion

Page 14: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

Objective of Distance Bounding Protocols

Definition (Distance Bounding)

A distance bounding is a process whereby one party is assured:

1 Of the identity of a second party,

2 That the latter is present in the neighborhood of the verifyingparty, at some point in the protocol.

Reader

TagAdversary

Reader

Tag

Distance bounding does not avoid relay attacks.

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 12/24

Page 15: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

Distance Bounding Based on the Speed of Light

Earliest distance bounding protocol: Brands and Chaum in 1993,based on an idea from Beth and Desmedt, 1990.

Measure the round-trip-time (RTT) of a given message.

TagReader

Neighborhood

Computation

Lightweight operationsduring RTT measurement.

1-bit challenges/responses.

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 13/24

Page 16: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

Distance Bounding Based on the Speed of Light

Earliest distance bounding protocol: Brands and Chaum in 1993,based on an idea from Beth and Desmedt, 1990.

Measure the round-trip-time (RTT) of a given message.

Reader

Neighborhood

computation

Accelerated

Tag

Lightweight operationsduring RTT measurement.

1-bit challenges/responses.

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 13/24

Page 17: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

Hancke and Kuhn’s Protocol (SecureComm 2005)

Reader Tag(secret K ) (secret K )

Pick a random Na Pick a random NbNa−−−−−−−→Nb←−−−−−−−

h(K ,Na,Nb) =

{v0 = 1 1 0 1 1 0 0 0 1 0

v1 = 0 1 1 1 1 0 0 1 0 0

Start of fast bit exchangefor i = 1 to n

Pick Ci ∈R {0, 1}Start Clock

Ci−−−−−−−→

Ri =

{v0i , if Ci = 0v1i , if Ci = 1

Stop ClockRi←−−−−−−−

Check: 4ti ≤ tmax

Check: correctness of Ri

End of fast bit exchange

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 14/24

Page 18: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

FROM THEORY TO PRACTICE

Relay Attacks

Distance Bounding Protocols

From Theory to Practice

Conclusion

Page 19: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

Attributes

Resistance to frauds.

Memory consumption.

Number of crypto op.

Final slow phase.

Single-bit messages.

Resilient to noisy channels.

Security proofs.

Mutual authentication.

Mutual distance bounding.

...

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 16/24

Page 20: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

Mafia and Distance Frauds

Definition (Mafia Fraud)

A mafia fraud is an attack where an adversary defeats adistance bounding protocol using a man-in-the-middle(MITM) between the reader and an honest tag locatedoutside the neighborhood.

Adversary

Tag

Reader

Definition (Distance Fraud)

A distance fraud is an attack where a dishonest and lonelyprover purports to be in the neighborhood of the verifier.

Tag

Reader

Definition (Terrorist Fraud)

A terrorist fraud is an attack where an adversary defeats adistance bounding protocol using a man-in-the-middlebetween the reader and a dishonest tag located outside ofthe neighborhood, such that the latter actively helps theadversary to maximize her attack success probability,without giving to her any advantage for future attacks.

Adversary

Tag

Reader

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 17/24

Page 21: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

Spider Charts for Two Protocol Instances

mafia fraud

distancefraud

terroristfraud

memory

cryptooperations

finalslow phase

Tree-{16, 8} BC-{16}

Joined work with Rolando Trujillo and Sjouke Mauw

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 18/24

Page 22: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

Candidates

Protocol Instance Parameter valuesBC-{n} n ∈ {1, · · · , 128}MAD-{n} n ∈ {1, · · · , 128}BB-{n} n ∈ {1, · · · , 128}HK-{n} n ∈ {1, · · · , 128}MP-{n, pf } n ∈ {1, · · · , 128}, pf ∈ {0, 0.05, 0.01, · · · , 1}Swiss-Knife-{n} n ∈ {1, · · · , 128}Tree-based-{n, `} n ∈ {1, · · · , 128}, ` ∈ {1, 2, · · · , 32}Poulidor-{n} n ∈ {1, · · · , 128}RC-{n} n ∈ {1, · · · , 128}YKHL-{n} n ∈ {1, · · · , 128}KA-{n, pd} n ∈ {1, · · · , 128}, pd ∈ {0, 0.05, 0.01, · · · , 1}SKI-{n, t} n ∈ {1, · · · , 128}, t ∈ {2, 3, · · · , 32}TMA-{n} n ∈ {1, · · · , 128}

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 19/24

Page 23: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

Non-Dominated Protocols

terrorist fraud

distance fraud

mafia fraud

memory

Poulidor Tree-based TMA

mafia fraud

distance fraud

terrorist fraud

single-bit

exchange

crypto operations

final slow phase

SKI Swiss-Knife

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 20/24

Page 24: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

Implemented Protocol: Measured round-trip time

Joined work with Rokia Lamrani Allaoui and Cristina Onete

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 21/24

Page 25: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

Fastest Attacks

Off-the-shelf tools: ≈ 10 milliseconds

Tested distance bounding protocol: RTT ≈ 90 microseconds

Thevenon et al.’s attack: ≈ 2 microseconds

Francillon et al.’s attack: ≈ 100 nanoseconds

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 22/24

Page 26: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

CONCLUSION

Relay Attacks

Distance Bounding Protocols

From Theory to Practice

Conclusion

Page 27: A Primer on Relay Attacks and Distance-bounding Protocols · 2018. 5. 29. · Objective of Distance Bounding Protocols De nition (Distance Bounding) Adistance boundingis a process

Conclusion

Practical DB-protocols mitigate the relay attacks.

Attacks are still possible, though.

Few devices implement DB-protocols

No real-life application use a DB-protocol ???

Still room for improvement: less computation, constant time,other frauds, proofs,...

Practical implementations are needed.

Gildas Avoine Workshop on DB Protocols – Sao Miguel Island, April 14-15, 2018 24/24