Timing attacks on PIN input in VoIP networks (short paper)

3Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

To access automated voice services, Voice over IP (VoIP) users sometimes are required to provide their Personal Identification Numbers (PIN) for authentication. Therefore when they enter PINs, their user-agents generate packets for each key pressed and send them immediately over the networks. This paper shows that a malicious intermediary can recover the inter-keystroke time delay for each PIN input even if the standard encryption mechanism has been applied. The inter-keystroke delay can leak information of what has been typed: Our experiments show that the average search space of a brute force attack on PIN can be reduced by around 80%. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Zhang, G., & Fischer-Hübner, S. (2011). Timing attacks on PIN input in VoIP networks (short paper). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6739 LNCS, pp. 75–84). https://doi.org/10.1007/978-3-642-22424-9_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free