Abstract
This paper clarifies straight replays which are one of replay attacks but have been somewhat misunderstood. There are various kinds of replay attacks on authentication protocols but most of the formal methods are not capable of detecting them because a replayed message may have appropriate data and structure for the protocols. [1] classified them and proposed their taxonomy that is useful for readily determining the effectiveness of some replay countermeasures and the appropriateness of analysis techniques for replays. [1] urges that any kinds of replay attacks are classified in the taxonomy. Among those classified attacks, however, straight replay attacks are ambiguous to be distinguished from forced delays which are really not regarded as replays.
Original language | English |
---|---|
Pages (from-to) | 47-52 |
Number of pages | 6 |
Journal | Operating Systems Review (ACM) |
Volume | 33 |
Issue number | 1 |
DOIs | |
Publication status | Published - 1999 Jan |
All Science Journal Classification (ASJC) codes
- Information Systems
- Hardware and Architecture
- Computer Networks and Communications