Book ChapterDOI
Thwarting Timing Attacks Using ATM Networks
Geraint Price
- pp 49-58
TLDR
This paper manipulates ATM technology's ability to provide guarantees associated with the bandwidth and delay characteristics over a given connection to provide timing guarantees on a cryptographic protocol message, which can be used to monitor for foul play in the message delivery process.Abstract:
In this paper, we describe a method of using Asynchronous Transfer Mode (ATM) network technology to defeat attacks that rely on the opponent's ability disrupt the timely delivery of messages within a cryptographic protocol. Our method centres on ATM technology's ability to provide guarantees associated with the bandwidth and delay characteristics over a given connection. We manipulate these mechanisms to provide timing guarantees on a cryptographic protocol message, which can be used to monitor for foul play in the message delivery process. We also describe how this can be used to detect a denial of service attack.read more
References
More filters
Journal ArticleDOI
Using encryption for authentication in large networks of computers
TL;DR: Use of encryption to achieve authenticated communication in computer networks is discussed and example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee.
Book
Fault tolerance, principles and practice
TL;DR: Methodology and Framework for Fault Tolerance.- Idealised Fault Tolerant Components.- Failure Exceptions.- Critical Components.- The Future.
Journal ArticleDOI
Timestamps in key distribution protocols
TL;DR: It is shown that key distribution protocols with timestamps prevent replays of compromised keys and have the additional benefit of replacing a two-step handshake.
Journal ArticleDOI
A logic of authentication
TL;DR: This paper shows how various protocols differ subtly with respect to the required initial assumptions of the participants and their final beliefs, and explains the formalism used to isolate and express these differences with a precision that was not previously possible.
ReportDOI
A Taxonomy of Replay Attacks
TL;DR: A taxonomy of replay attacks on cryptographic protocols in terms of message origin and destination is presented, complete in the sense that any replay attack is composed entirely of elements classified by the taxonomy.