Questions tagged [replay-attack]
Attacks that are based on recording an encrypted and/or signed communication and replaying it at a later time.
53 questions
1 vote
3 answers
306 views
Can I iteratively generate AES GCM nonce? Encrypting nonce? Use nonce to prevent replay attacks?
I'm creating a protocol for securely sharing files peer to peer. I will use RSA OAEP to perform a handshake between peers, then use AES GCM to share the files. I watched this video about how GCM works ...
1 vote
0 answers
36 views
Necessary collision resistance of a nonce for replay protection
In request/response communication, replay protection can be implemented by exchanging a random number. For example, in its secure request, a client sends a random UID (nonce) to the server in addition ...
0 votes
0 answers
40 views
Is it possible to design purely staless replay attack free client-server relationship?
The use case is fairly simple: Client sends request1 to Server endpoint1. Server endpoint1 responses with response1. Then Client sends request2 to Server endpoint2. Server endpoint2 responses with ...
1 vote
0 answers
57 views
Is a sequence number as a key ID always problematic (replay attack)?
I would like to know whether a sequence number as a key ID is always problematic with regard to replay attacks. I am aware that there are several interesting aspects (predictability, overflows, ...
0 votes
0 answers
217 views
Simple and efficient auth scheme to prevent replay attacks
This is a machine-to-machine authentication proposal with the following requirements: Avoid replay attacks. Leaked or intercepted auth tokens cannot be reused at all. Impersonation resistant. The ...
0 votes
1 answer
903 views
AES-GCM vulnerabilities
Does AES-GCM take replay attacks into consideration? If an attacker intercepts the AES-GCM secured message and gains access to the initialization vector (IV), can they inject falsely fabricated data (...
2 votes
0 answers
152 views
I understand the authentication procedure, but are replay attacks possible in these scenarios?
Would a replay attack be possible in any of these scenarios? My understanding is that in only images 3 & 4 it is possible.
3 votes
1 answer
208 views
Do random numbers avoid replay attacks in Chaum's mixes?
So I've been visiting a security lecture at my university and they introduced the concept of Chaum's mixes to us and how replay attacks can compromise the anonymity granted by a mixnet. It is ...
0 votes
0 answers
871 views
How to use nonces to prevent replay attacks while enabling concurrent requests?
Nonces are often used to prevent replay attacks in networks. Because they are a one time use, any attacker replaying a request would be stopped because the nonce would be invalid. However using nonces ...
1 vote
1 answer
146 views
Can a nonce be completely random on (simplified) Needham–Schroeder Protocol?
From what I've read so far, nonces are random one-time values, which are sent in plaintext in addition to the ciphertext to verify identity of sender/receiver. Theoretically, if the nonce is random, ...
1 vote
1 answer
215 views
How to properly guarantee authentication, confidentiality, and replay-resistance for multiple messages using a pre-shared key?
I have a device that needs to communicate with another host and exchange fixed-length messages. All traffic should be encrypted and authenticated, and it should be resistant to replay attacks. ...
2 votes
2 answers
2k views
Is it OK to use r-value from ECDSA signature (r, s) to prevent replay attack?
ECDSA signatures are malleable. Given a valid signature (r, s), one can create a second valid signature by negating the s value. I have searched workaround for this issue, and https://yondon.blog/2019/...
4 votes
1 answer
140 views
Replay attacks and LWE
Just a small question. Since in LWE the error is rather small, is there a problem with replay attacks? What I mean is that if we use the typical scheme of Regev [1] to encrypt a vector m, but this ...
1 vote
1 answer
120 views
Could PAKE via smooth projective hash function protect agaist replay attacks?
I came across some password-based authenticated key exchange (PAKE) protocols that are based on the smooth projective hash function (SPHF) in the standard model. And I checked some related works, and ...
1 vote
1 answer
98 views
If two hosts are using a transparent IP level authentication and encryption, is their communication subject to both MITM or replay attacks?
Encryption process for any outgoing packet to the specified "remote IP": -original payload P is encrypted (the bytes after the IP header) using RC4 with the preestablished key ...