Practical and provably secure distance-bounding
Paper in proceeding, 2015

From contactless payments to remote car unlocking, many applications are vulnerable to relay attacks. Distance bounding protocols are the main practical countermeasure against these attacks. At FSE 2013, we presented SKI as the first family of provably secure distance bounding protocols. At LIGHTSEC 2013, we presented the best attacks against SKI. In this paper, we present the security proofs. More precisely, we explicate a general formalism for distance-bounding protocols. Then, we prove that SKI and its variants is provably secure, even under the real-life setting of noisy communications, against the main types of relay attacks: distance-fraud and generalised versions of mafia- and terrorist-fraud. For this, we reinforce the idea of using secret sharing, combined with the new notion of a leakage scheme. In view of resistance to mafia-frauds and terrorist-frauds, we present the notion of circular-keying for pseudorandom functions (PRFs); this notion models the employment of a PRF, with possible linear reuse of the key. We also use PRF masking to fix common mistakes in existing security proofs/claims.

Distance frauds

Provably secure

Contactless payment

Pseudo-random functions

Terrorist frauds

Distance bounding

Security proofs

Distance bounding protocols

Author

I. Boureanu

Haute Ecole Specialisee de Suisse occidentale

HEIG-VD

Aikaterini Mitrokotsa

Chalmers, Computer Science and Engineering (Chalmers), Networks and Systems (Chalmers)

S. Vaudenay

Swiss Federal Institute of Technology in Lausanne (EPFL)

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

03029743 (ISSN) 16113349 (eISSN)

Vol. 7807 248-258
978-3-319-27658-8 (ISBN)

Subject Categories

Computer and Information Science

DOI

10.1007/978-3-319-27659-5_18

ISBN

978-3-319-27658-8

More information

Latest update

9/6/2018 1