Session Key Disclosure Attack Sample Clauses

POPULAR SAMPLE Copied 1 times
Session Key Disclosure Attack. Even if A has obtained values, as mentioned above, A cannot generate the session key SK. The SK comprises the hash function with secret random numbers ri and rj. However, A cannot extract random numbers, because they are masked with secret parameters MVi and RBj. Moreover, MVi and RBj are also masked with random numbers. Therefore, A does not know about the session key SK.
Session Key Disclosure Attack. ‌ A malicious attacker A can perform the side channel attack on TPD [1–3] and OBU. Accordingly, A can obtain values stored in OBU and TPD, and also obtain transmitted messages through insecure channels. Thus, A can compute the session key using the obtained values. Step 1: A can obtain P in OBUi and Xi, Pprii in TPDi using side channel attack. And A also can obtain the value RIDi through transmitted message. Subsequently, A can compute si = P ⊕ RIDi ⊕ Pprii . Step 2: A can obtain IDi+2 and T1 from transmitted messages and A obtains the value IDRSUj , which is public value. Therefore, A can compute SKRIDi = si ⊕ h(IDi+2||T1) ⊕ IDRSUj .