Replay Attacks - Columbus State University

February 15, 2018 | Author: Anonymous | Category: Science, Biology, Zoology, Parasitology
Share Embed Donate


Short Description

Download Replay Attacks - Columbus State University...

Description

Replay Attacks

Replay Attack • First, attacker intercepts a message – Not difficult to do

Replay Attack • Later, attacker retransmits (replays) the message to the original destination host – Does not have to be able to read a message to replay it

Replay Attack • Why replay attacks? – To gain access to resources by replaying an authentication message – In a denial-of-service attack, to confuse the destination host

Thwarting Replay Attacks • Put a time stamp in each message to ensure that the message is “fresh” – Do not accept a message that is too old

• Place a sequence number in each message – Do not accept a duplicated message Message Time Stamp

Sequence Number

Thwarting Replay Attacks • In request-response applications, – Sender of request generates a nonce (random number) – Places the nonce in the request – Server places the nonce in the response – Neither party accepts duplicate nonces Request Nonce

Response Nonce

Thwarting Replay Attacks • To prevent changes in the message being replayed – Message integrity is needed – Requires a digital signature or equivalent • See HMAC under IPsec Message Digital Signature Or HMAC

View more...

Comments

Copyright � 2017 NANOPDF Inc.
SUPPORT NANOPDF