Abstract
Many algorithms or protocols, in particular cryptographic protocols such as authentication protocols, use synchronized clocks and depend on them for correctness. This note describes a scenario where a clock synchronization failure renders a protocol vulnerable to an attack even
after
the faulty clock has been resynchronized. The attack exploits a postdated message by first suppressing it and replaying it later.
Publisher
Association for Computing Machinery (ACM)
Cited by
61 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献