Message authentication guarantees the integrity of messages exchanged over untrusted channels. Yet, the required per-message authentication tags considerably expand packet sizes, which is especially problematic in constrained environments. To address this issue, progressive message authentication aggregates and distributes integrity protection over multiple messages, promising to reduce overheads while upholding strong security of traditional integrity protection. However, as we show in this paper, existing progressive message authentication schemes are susceptible to packet drops: By interfering with just two selected packets, an attacker can remove integrity protection from a complete sequence of messages. Revisiting the security of progressive message authentication, we consider it imperative to thwart such attacks by rethinking how authentication tags depend on the successful reception of packets. To this end, we propose R2-D2, which relies on randomized dependencies with parameterized security guarantees to mitigate network-level attacks inherent to current progressive authentication schemes. To deploy our approach to resource-constrained devices, we introduce SP-MAC, which implements R2-D2 using efficient XOR operations. Our evaluation shows that SP-MAC protects against sophisticated network-layer attacks, and still operates as resources-conscious and fast as existing insecure schemes.
翻译:但是,正如我们在本文件中所表明的那样,现有的进步信息认证计划可以保证在不受信任的渠道上交换的信息的完整性。然而,要求的每个邮件认证标签可以大大扩大软件包的尺寸,这在受限制的环境中特别成问题。为了解决这个问题,进步信息认证集集体和分配对多种信息的完整性保护,有希望减少间接费用,同时维护传统完整性保护的强大安全。然而,正如我们在本文件中所表明的那样,现有的进步信息认证计划很容易被包装袋漏掉:通过仅仅干扰两个选定的软件包,攻击者就可以从完整顺序的信息中消除完整性保护。重新审视进步信息认证的安全性,我们认为,必须重新思考认证标签如何依赖成功接收软件包。为此,我们提议R2-D2, 依靠有参数化安全保障的随机依赖性来减轻当前渐进认证计划所固有的网络级袭击。为了运用资源限制装置,我们引入了SP-MAC,它使用高效的 XOR操作来实施R2-D2。我们的评估表明,SP-MAC保护网络层的尖端攻击,并且仍然像现有的不安全计划那样以资源意识和快速运作。