Authors: Knežević, Milica 
Tomović, Siniša 
Mihaljević, Miodrag J. 
Affiliations: Mathematical Institute of the Serbian Academy of Sciences and Arts 
Title: Man-In-The-Middle Attack against Certain Authentication Protocols Revisited: Insights into the Approach and Performances Re-Evaluation
Journal: Electronics
Volume: 9
Issue: 8
First page: 1
Last page: 23
Issue Date: 12-Aug-2020
Rank: M22
ISSN: 2079-9292
DOI: 10.3390/electronics9081296
We address a class of authentication protocols called “HB” ones and the man-in-the-middle (MIM) attack, reported at the ASIACRYPT conference, called OOV-MIM (Ouafi-Overbeck-Vaudenay MIM). Analysis of the considered attack and its systematic experimental evaluation are given. It is shown that the main component of OOV-MIM, the algorithm for measuring the Hamming weight of noise vectors, outputs incorrect results as a consequence of the employed approximation of the probability distributions. The analysis reveals that, practically, the only scenario in which the OOV-MIM attack is effective is the one in which two incorrect estimations produced by the algorithm for measuring the Hamming weight, when coupled, give the correct result. This paper provides additional insights into the OOV-MIM and corrected claims about the performance/complexity showing that the performances of the considered attack have been overestimated, i.e., that the complexity of the attack has been underestimated. Particularly, the analysis points out the reasons for the incorrect claims and to the components of the attack that do not work as expected.
Article no. 1296
Keywords: authentication protocol | HB | man-in-the-middle attack | cryptanalysis | performance | RFID
Publisher: MDPI

Show full item record


checked on May 21, 2024

Page view(s)

checked on May 9, 2024

Google ScholarTM




Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.