Voice Commitment. Prior to the DH key exchange, both peers choose a ran- dom SAS and speak it out aloud, while it is recorded by the application. In Figure 1, audio fingerprints fA and fB are then created from this recording and encoded by an appro- priate error correcting code to fAj and fBj (cf. [3]). The rest 1▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇ of the protocol follows the well studied DH key agreement, while the public parts are authenticated with HMAC using 2▇▇▇▇▇://▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/web/security/ fAj and fBj as secrets. The shared secret s is finally used to play recorded SAS fˆB = F (SASB ) Encode play recorded SAS B fˆA = F (SASA) Fraction of identcial bits in fingerprints Synchronisation accuracy (several experimental settings) Encode Expected fra ction of iden tical bits in the fingerprint of an attacke r ft ←−−−−− fˆ ft ←−−−−− fˆ verify with HMAC (fBt , yB ) verify with HMAC (fAt , yA) repeat SAS aloud Was that ▇▇▇▇▇’ voice? Has ▇▇▇▇▇ repeated my SASB ?
Appears in 2 contracts
Sources: N/A, Not Applicable