In this letter, we show that some stream authentication schemes using hash chaining are highly vulnerable to denial of service (DoS) attacks. An adversary can disrupt all receivers of group by making use of modifying a few packets in those schemes.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Namhi KANG, Christoph RULAND, "Security Analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining" in IEICE TRANSACTIONS on Communications,
vol. E88-B, no. 3, pp. 1264-1265, March 2005, doi: 10.1093/ietcom/e88-b.3.1264.
Abstract: In this letter, we show that some stream authentication schemes using hash chaining are highly vulnerable to denial of service (DoS) attacks. An adversary can disrupt all receivers of group by making use of modifying a few packets in those schemes.
URL: https://global.ieice.org/en_transactions/communications/10.1093/ietcom/e88-b.3.1264/_p
Copy
@ARTICLE{e88-b_3_1264,
author={Namhi KANG, Christoph RULAND, },
journal={IEICE TRANSACTIONS on Communications},
title={Security Analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining},
year={2005},
volume={E88-B},
number={3},
pages={1264-1265},
abstract={In this letter, we show that some stream authentication schemes using hash chaining are highly vulnerable to denial of service (DoS) attacks. An adversary can disrupt all receivers of group by making use of modifying a few packets in those schemes.},
keywords={},
doi={10.1093/ietcom/e88-b.3.1264},
ISSN={},
month={March},}
Copy
TY - JOUR
TI - Security Analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining
T2 - IEICE TRANSACTIONS on Communications
SP - 1264
EP - 1265
AU - Namhi KANG
AU - Christoph RULAND
PY - 2005
DO - 10.1093/ietcom/e88-b.3.1264
JO - IEICE TRANSACTIONS on Communications
SN -
VL - E88-B
IS - 3
JA - IEICE TRANSACTIONS on Communications
Y1 - March 2005
AB - In this letter, we show that some stream authentication schemes using hash chaining are highly vulnerable to denial of service (DoS) attacks. An adversary can disrupt all receivers of group by making use of modifying a few packets in those schemes.
ER -