Skip to main content

Questions tagged [replay-attack]

Attacks that are based on recording an encrypted and/or signed communication and replaying it at a later time.

1 vote
3 answers
306 views

I'm creating a protocol for securely sharing files peer to peer. I will use RSA OAEP to perform a handshake between peers, then use AES GCM to share the files. I watched this video about how GCM works ...
Vexcess's user avatar
  • 11
1 vote
0 answers
36 views

In request/response communication, replay protection can be implemented by exchanging a random number. For example, in its secure request, a client sends a random UID (nonce) to the server in addition ...
SBond's user avatar
  • 143
0 votes
0 answers
40 views

The use case is fairly simple: Client sends request1 to Server endpoint1. Server endpoint1 responses with response1. Then Client sends request2 to Server endpoint2. Server endpoint2 responses with ...
Azii's user avatar
  • 129
1 vote
0 answers
57 views

I would like to know whether a sequence number as a key ID is always problematic with regard to replay attacks. I am aware that there are several interesting aspects (predictability, overflows, ...
SBond's user avatar
  • 143
0 votes
0 answers
217 views

This is a machine-to-machine authentication proposal with the following requirements: Avoid replay attacks. Leaked or intercepted auth tokens cannot be reused at all. Impersonation resistant. The ...
actonchart's user avatar
0 votes
1 answer
903 views

Does AES-GCM take replay attacks into consideration? If an attacker intercepts the AES-GCM secured message and gains access to the initialization vector (IV), can they inject falsely fabricated data (...
udit's user avatar
  • 1
2 votes
0 answers
152 views

Would a replay attack be possible in any of these scenarios? My understanding is that in only images 3 & 4 it is possible.
timberus's user avatar
3 votes
1 answer
208 views

So I've been visiting a security lecture at my university and they introduced the concept of Chaum's mixes to us and how replay attacks can compromise the anonymity granted by a mixnet. It is ...
prettybonsai's user avatar
0 votes
0 answers
871 views

Nonces are often used to prevent replay attacks in networks. Because they are a one time use, any attacker replaying a request would be stopped because the nonce would be invalid. However using nonces ...
CMCDragonkai's user avatar
1 vote
1 answer
146 views

From what I've read so far, nonces are random one-time values, which are sent in plaintext in addition to the ciphertext to verify identity of sender/receiver. Theoretically, if the nonce is random, ...
suigetsuh17's user avatar
1 vote
1 answer
215 views

I have a device that needs to communicate with another host and exchange fixed-length messages. All traffic should be encrypted and authenticated, and it should be resistant to replay attacks. ...
Steven's user avatar
  • 131
2 votes
2 answers
2k views

ECDSA signatures are malleable. Given a valid signature (r, s), one can create a second valid signature by negating the s value. I have searched workaround for this issue, and https://yondon.blog/2019/...
Plum Lee's user avatar
4 votes
1 answer
140 views

Just a small question. Since in LWE the error is rather small, is there a problem with replay attacks? What I mean is that if we use the typical scheme of Regev [1] to encrypt a vector m, but this ...
absinthe_minded's user avatar
1 vote
1 answer
120 views

I came across some password-based authenticated key exchange (PAKE) protocols that are based on the smooth projective hash function (SPHF) in the standard model. And I checked some related works, and ...
Z.P.'s user avatar
  • 353
1 vote
1 answer
98 views

Encryption process for any outgoing packet to the specified "remote IP": -original payload P is encrypted (the bytes after the IP header) using RC4 with the preestablished key ...
Koolz's user avatar
  • 13

15 30 50 per page