【24h】

Cryptographic Protocol Analysis of AN.ON

机译:AN.ON的加密协议分析

获取原文

摘要

This work presents a cryptographic analysis of AN.ON's anonymization protocols. We have discovered three flaws of differing severity. The first is caused by the fact that the freshness of the session key was not checked by the mix. This flaw leads to a situation where an external attacker is able to perform a replay attack against AN.ON. A second, more severe, error was found in the encryption scheme of AN.ON. An internal attacker controlling the first mix in a cascade of length two is able to de-anonymize users with high probability. The third flaw results from the lack of checks to ensure that a message belongs to the current session. This enables an attacker to impersonate the last mix in a cascade. The flaws we discovered represent errors that, unfortunately, still occur quite often and show the importance of either using standardized crytpographic protocols or performing detailed security analyses.
机译:这项工作提出了对A.ON的匿名协议的加密分析。我们发现了三个不同严重程度的缺陷。第一个是由混合物检查会话键的新鲜度引起的。这个缺陷导致外部攻击者能够对AN.ON执行重放攻击的情况。在AN.ON的加密方案中发现了第二个,更严重的错误。控制长度级联中的第一个混合的内部攻击者能够将具有高概率的用户进行匿名化。第三种缺陷因缺乏检查而导致确保消息属于当前会话。这使攻击者能够模拟级联中的最后一个混合。我们发现的缺陷代表了错误,遗憾的是,仍然经常出现并显示使用标准化的加密协议或执行详细安全分析的重要性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号