Attacking and Repairing the Improved ModOnions Protocol
نویسندگان
چکیده
In this paper, we present a new class of attacks against an anonymous communication protocol, originally presented in ACNS 2008. The protocol itself was proposed as an improved version of ModOnions, which uses universal re-encryption in order to avoid replay attacks. However, ModOnions allowed the detour attack, introduced by Danezis to re-route ModOnions to attackers in such a way that the entire path is revealed. The ACNS 2008 proposal addressed this by using a more complicated key management scheme. The revised protocol is immune to detour attacks. We show, however, that the ModOnion construction is highly malleable and this property can be exploited in order to redirect ModOnions. Our attacks require detailed probing and are less efficient than the detour attack, but they can nevertheless recover the full onion path while avoiding detection and investigation. Motivated by this, we present a new modification to the ModOnion protocol that dramatically reduces the malleability of the encryption primitive. It addresses the class of attacks we present and it makes other attacks difficult to formulate.
منابع مشابه
Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach
In this paper, we present a new class of attacks against an anonymous communication protocol, originally presented in ACNS 2008. The protocol itself was proposed as an improved version of ModOnions, which exploits universal re-encryption in order to avoid replay attacks. However, ModOnions allowed the detour attack, introduced by Danezis to re-route ModOnions to attackers in such a way that the...
متن کاملA note on the security of two improved RFID protocols
Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...
متن کاملAn Enhanced AODV Route Repairing Mechanism in Wireless Ad-Hoc Sensor Network
—Ad hoc On-demand Distance Vector (AODV) routing protocol has been widely applied in Wireless Ad-hoc Sensor Networks (WASN). Link breaks often occur in WASN due to the mobility of nodes or other reasons. Only after a link break detected, the route repair scheme in AODV will be initiated to keep the connectivity of network. In this paper, we propose an enhanced Preemptive Local Repairing Mechan...
متن کاملSecurity Analysis of the Distance Bounding Protocol Proposed by Jannati and Falahati
In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. In addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...
متن کاملImproved Protocol for Isolation of Genomic DNA from Leaf Tissues of Phyllanthus emblica Gaertn
Modified Cetyltrimethylammonium bromide (CTAB) protocol for DNA isolation was developed from leaf tissuesof Phyllanthus emblica for obtaining high quality genomic DNA. Fresh leaves of three different maturitywere analyzed for yield and quality of DNA. Acidity was determined in three different maturity of leaves viz.tender, intermediate and mature and their influence on DNA qua...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009