[cryptography] Reflection Attacks in Challenge/Response Protocols

2013-08-24 Thread Jeffrey Walton
Hi All, When a symmetric key based challenge response is used, an attacker can perform a reflection attack by starting a second instance of a protocol and having the server answer its own questions. To guard against the attack, is it sufficient to ensure all challenges sent from server to client

Re: [cryptography] Reflection Attacks in Challenge/Response Protocols

2013-08-24 Thread Natanael
The client and the server shouldn't both generate responses exactly the same way with the same key, no. If you use HMAC, I think including a simple identifier would be good enough. Something like this: HMAC(key, device ID + counter + timestamp), where the server and client has different IDs. Den