Relay attack

A relay attack (also known as the two-thief attack)[1] in computer security is a type of hacking technique related to man-in-the-middle and replay attacks. In a classic man-in-the-middle attack, an attacker intercepts and manipulates communications between two parties initiated by one of the parties. In a classic relay attack, communication with both parties is initiated by the attacker who then merely relays messages between the two parties without manipulating them or even necessarily reading them.

Relay station attack. Two relay stations connect over a long distance the owners transponder with the cars transceiver.

Example attack

Peggy works in a high security building that she accesses using a smart card in her purse. When she approaches the door of the building, the building detects the presence of a smart card and initiates an exchange of messages that constitute a zero-knowledge password proof that the card is Peggy's. The building then allows Peggy to enter.

Mallory wants to break into the building.

  1. Mallory approaches the building with a device that simulates a smart card, and the building responds by initiating the exchange of messages.
  2. Mallory forwards the message to her accomplice Evelyn who is tailing Peggy as she runs errands in another part of town.
  3. Evelyn relays the message to Peggy's smart card, listens for the answer, and forwards the answer to Mallory, who relays it to the building. Continuing in this way, Mallory and Evelyn relay messages between the building and Peggy's smart card until the building is satisfied that it is communicating with Peggy's smart card.
  4. The building opens and Mallory enters.

References

  1. Jeong, Hyera; So, Jaewoo (2018-03-01). "Channel correlation‐based relay attack avoidance in vehicle keyless‐entry systems". Electronics Letters. 54 (6): 395–397. doi:10.1049/el.2017.4360. ISSN 0013-5194. S2CID 115601361.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.