Problems understanding the use of Distance Bounding against Man-In-The-Middle attacks

I currently have to write a paper for university in my Network Security lecture about methods of secure location verification. Therefore, I chose to write about several distance bounding protocols, e.g. the one by Brands and Chaum and the … Continue reading Problems understanding the use of Distance Bounding against Man-In-The-Middle attacks

How challenge response password recovery mechanism works with disk encryption?

For the sole purpose of learning, I am trying to figure out how disk encryption software is able to recover password of an encrypted disk using a challenge response mechanism.

Th recovery process usually goes like that:

You forgot your… Continue reading How challenge response password recovery mechanism works with disk encryption?

How challenge response password recovery mechanism works with disk encryption?

For the sole purpose of learning, I am trying to figure out how disk encryption software is able to recover password of an encrypted disk using a challenge response mechanism.

Th recovery process usually goes like that:

You forgot your… Continue reading How challenge response password recovery mechanism works with disk encryption?

Why does WebAuthn require a challenge when asking the client to register a new credential?

When registering a new credential as part of WebAuthn, why does the client need to be sent a challenge?

Presumably this is to prevent a replay attack, but wouldn’t a replay attack be prevented by TLS already?

Continue reading Why does WebAuthn require a challenge when asking the client to register a new credential?

Is there a password based challenge response authentication scheme with public key cryptography?

I was thinking about an authentication where

the user only has to know a password
but no salt, everything else the client retrieves from the server
yet a user’s password can’t be retrieved from the data on the server
nor fr… Continue reading Is there a password based challenge response authentication scheme with public key cryptography?

Which is more secure Yubikey + Keepass using Challenge/Response or Yubikey + Keepass using OTP?

I use a Windows 10 PC and an Android phone with Keepass.

I would like to add a second factor on top of my master password that works with both Windows 10 and my Android phone.

Between the two support methods of authenticati… Continue reading Which is more secure Yubikey + Keepass using Challenge/Response or Yubikey + Keepass using OTP?