Title :
Strategies against replay attacks
Author_Institution :
Digital Syst. Lab., Helsinki Univ. of Technol., Espoo, Finland
Abstract :
The goal of the paper is to present a set of design principles for avoiding replay attacks in cryptographic protocols. The principles are easily applied to real protocols and they do not consume excessive computing power or communications bandwidth. In particular we describe how to type-tag messages with unique cryptographic functions, how to inexpensively implement the full information principle with hashes, and how to produce unique session keys without assuming mutual trust between the principals. The techniques do not guarantee security of protocols, but they are concrete ways for improving the robustness of the protocol design with relatively low cost
Keywords :
cryptography; data structures; message authentication; protocols; communications bandwidth; computing power; cryptographic protocols; design principles; hashes; information principle; message type-tagging; mutual trust; protocol design; replay attacks; robustness; unique cryptographic functions; unique session keys; Authentication; Bandwidth; Concrete; Costs; Cryptographic protocols; Cryptography; Digital systems; Information security; Laboratories; Robustness;
Conference_Titel :
Computer Security Foundations Workshop, 1997. Proceedings., 10th
Conference_Location :
Rockport, MA
Print_ISBN :
0-8186-7990-5
DOI :
10.1109/CSFW.1997.596787