handouts/ho05.tex
changeset 273 03321ef4349a
parent 272 4f4612d5f670
child 274 1e1008403f17
equal deleted inserted replaced
272:4f4612d5f670 273:03321ef4349a
   769 \item $T \to C$: $N, G'$
   769 \item $T \to C$: $N, G'$
   770 \item $C$ checks that $G = G'$
   770 \item $C$ checks that $G = G'$
   771 \end{enumerate}
   771 \end{enumerate}
   772 
   772 
   773 \noindent The assumption is that the key $K$ is only known to
   773 \noindent The assumption is that the key $K$ is only known to
   774 the car and the transponder. Again, I leave it to you to find
   774 the car and the transponder. The claim is that $C$ and $T$ can
       
   775 authenticate to each other. Again, I leave it to you to find
   775 out the magic why this protocol is immune from
   776 out the magic why this protocol is immune from
   776 person-in-the-middle attacks. 
   777 person-in-the-middle attacks. 
   777 
   778 
   778 
   779 
   779 \subsubsection*{Further Reading}
   780 \subsubsection*{Further Reading}
   780 
   781 
   781 {\small
   782 If you want to know more about how cars can be hijacked,
       
   783 the paper  
       
   784 
       
   785 \begin{center}
   782 \url{http://www.cs.ru.nl/~rverdult/Gone_in_360_Seconds_Hijacking_with_Hitag2-USENIX_2012.pdf}}
   786 \url{http://www.cs.ru.nl/~rverdult/Gone_in_360_Seconds_Hijacking_with_Hitag2-USENIX_2012.pdf}}
       
   787 \end{center}
       
   788 
       
   789 \noindent is quite amusing to read. Obviously an even more
       
   790 amusing paper would be ``Dismantling Megamos Crypto: 
       
   791 Wirelessly Lockpicking a Vehicle Immobilizer'' but because
       
   792 of the court injuction by VW we are denied this entertainment.
       
   793 
       
   794 Person-in-the-middle-attacks in the ``wild'' are described 
       
   795 with real data in the blog post
       
   796 
       
   797 \begin{center}
       
   798 \url{http://www.renesys.com/2013/11/mitm-internet-hijacking}
       
   799 \end{center}
       
   800 
       
   801 \noindent The conclusion in this post is that person-in-the-middle-attacks
       
   802 can be launched from any place on Earth---it is not required 
       
   803 to sit in the ``middle'' of the communication of two people.
       
   804 You just have to route their traffic through a node you own.
   783 
   805 
   784 \end{document}
   806 \end{document}
   785 
   807 
   786 %%% Local Variables: 
   808 %%% Local Variables: 
   787 %%% mode: latex
   809 %%% mode: latex