Abstract
Bluetooth-like applications face the pairing problem: two devices want to establish a relationship between them without any prior private information. Hoepman studied the ephemeral pairing problem by regarding the human operator of the devices as a messenger in an authenticated and/or private low-bandwidth channel between the nodes. Here we study the pairing problem with user interaction in which the operator can participate by doing extra (simple) computations.
Chapter PDF
Similar content being viewed by others
References
Steven M. Bellovin and Michael Merritt, Encrypted key exchange: Password-based protocols secure against dictionnary attacks, IEEE symposium on Research in Security and Privacy, IEEE Computer Society Press, 1992, pp. 72–84.
Colin Boyd and Anish Mathuria, Protocols for authentication and key establishment, Information Security and Cryptography, Springer-Verlag, 2003.
Victor Boyko, Phillip MacKenzie, and Sarvar Patel, Provably secure password-authenticated key exchange using Diffie-Hellman, Advances in Cryptology (Eurocrypt’00), Lecture notes in computer science, vol. 1807, Springer-Verlag, 2000, pp. 156–171.
Mihir Bellare, David Pointcheval, and Phillip Rogaway, Authenticated key exchange secure against dictionary attacks, Advances in Cryptology (Eurocrypt’00), Lecture notes in computer science, vol. 1807, Springer-Verlag, 2000, pp. 139–155.
Mihir Bellare and Phillip Rogaway, Entity authentication and key distribution, Advances in Cryptology (Crypto’93), Lecture notes in computer science, vol. 773, Springer-Verlag, 1994, p. 232.
Whitfield Diffie and Martin E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory IT-22(6) (1976), 644–654.
Christian Gehrmann and Kaisa Nyberg, Enhancements to Bluetooth baseband security, Proceedings of Nordsec 2001, 2001, Copenhagen, Denmark.
____, Security in personal area networks, Security for Mobility (2004), 191–230, IEE, London.
Jaap-Henk Hoepman, The ephemeral pairing problem, Eighth International Conference on Financial Cryptography, Lecture notes in computer science, vol. 3110, Springer-Verlag, 2004, Key West, FL, USA, pp. 212–226.
____, Ephemeral pairing on anonymous networks, To appear in the Proceedings of Second IEEE International Workshop on Pervasive Computing and Communication Security, Lecture notes in computer science, Springer-Verlag, 2005.
Markus Jakobsson, Method and apparatus for immunizing against offline dictionary attacks, U.S. Patent Application 601283,996. Filed on 16th April 2001, 2001.
Barry Jaspan, Dual-workfactor encrypted key exchange: Efficiently preventing password chaining and dictionnary attacks, 6th USENIX Security Symposium, San Jose, California, 1996, pp. 43–50.
Gavin Lowe, Some new attacks upon security protocols, 9th IEEE Computer Security Fondations Workshop, IEEE Computer Society Press, 1996, pp. 162–169.
Philip MacKenzie, The PAK suite: Protocols for password-authenticated key exchange, Tech. Report 2002-46, DIMACS, 2002.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this paper
Cite this paper
Peyrin, T., Vaudenay, S. (2005). The Pairing Problem with User Interaction. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds) Security and Privacy in the Age of Ubiquitous Computing. SEC 2005. IFIP Advances in Information and Communication Technology, vol 181. Springer, Boston, MA. https://doi.org/10.1007/0-387-25660-1_17
Download citation
DOI: https://doi.org/10.1007/0-387-25660-1_17
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-25658-0
Online ISBN: 978-0-387-25660-3
eBook Packages: Computer ScienceComputer Science (R0)