2020
DOI: 10.3390/electronics9081296
|View full text |Cite
|
Sign up to set email alerts
|

Man-In-The-Middle Attack against Certain Authentication Protocols Revisited: Insights into the Approach and Performances Re-Evaluation

Abstract: We address a class of authentication protocols called “HB” ones and the man-in-the-middle (MIM) attack, reported at the ASIACRYPT conference, called OOV-MIM (Ouafi-Overbeck-Vaudenay MIM). Analysis of the considered attack and its systematic experimental evaluation are given. It is shown that the main component of OOV-MIM, the algorithm for measuring the Hamming weight of noise vectors, outputs incorrect results as a consequence of the employed approximation of the probability distributions. The analysis reveal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…This is the major target of hackers since it involves transmitting sensitive information. Hackers prey on businesses and organizations, causing enormous financial damage [10]. The MITM attacks are the most effective method of controlling sensitive end-user information being sent.…”
Section: A Backgroundmentioning
confidence: 99%
“…This is the major target of hackers since it involves transmitting sensitive information. Hackers prey on businesses and organizations, causing enormous financial damage [10]. The MITM attacks are the most effective method of controlling sensitive end-user information being sent.…”
Section: A Backgroundmentioning
confidence: 99%
“…In such scenarios tracing down the culprit is also difficult [7]. There are various security and privacy challenges [8][9][10] with the traditional authentication systems and a highly secure authentication system is required [11]. The limitations of the traditional frameworks can be overcome by using biometrics, which is based on biometric traits of a human [12,13].…”
Section: Introductionmentioning
confidence: 99%