scispace - formally typeset
Book ChapterDOI

Thwarting Timing Attacks Using ATM Networks

Geraint Price
- pp 49-58
TLDR
This paper manipulates ATM technology's ability to provide guarantees associated with the bandwidth and delay characteristics over a given connection to provide timing guarantees on a cryptographic protocol message, which can be used to monitor for foul play in the message delivery process.
Abstract
In this paper, we describe a method of using Asynchronous Transfer Mode (ATM) network technology to defeat attacks that rely on the opponent's ability disrupt the timely delivery of messages within a cryptographic protocol. Our method centres on ATM technology's ability to provide guarantees associated with the bandwidth and delay characteristics over a given connection. We manipulate these mechanisms to provide timing guarantees on a cryptographic protocol message, which can be used to monitor for foul play in the message delivery process. We also describe how this can be used to detect a denial of service attack.

read more

References
More filters
Journal ArticleDOI

Using encryption for authentication in large networks of computers

TL;DR: Use of encryption to achieve authenticated communication in computer networks is discussed and example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee.
Book

Fault tolerance, principles and practice

TL;DR: Methodology and Framework for Fault Tolerance.- Idealised Fault Tolerant Components.- Failure Exceptions.- Critical Components.- The Future.
Journal ArticleDOI

Timestamps in key distribution protocols

TL;DR: It is shown that key distribution protocols with timestamps prevent replays of compromised keys and have the additional benefit of replacing a two-step handshake.
Journal ArticleDOI

A logic of authentication

TL;DR: This paper shows how various protocols differ subtly with respect to the required initial assumptions of the participants and their final beliefs, and explains the formalism used to isolate and express these differences with a precision that was not previously possible.
ReportDOI

A Taxonomy of Replay Attacks

Paul Syverson
TL;DR: A taxonomy of replay attacks on cryptographic protocols in terms of message origin and destination is presented, complete in the sense that any replay attack is composed entirely of elements classified by the taxonomy.
Related Papers (5)