Port Knocking Replay Attack Prevention with OTP S/Key and Diffie Hellman Key Exchange

M. Yusuf Bambang Setiadji, S.ST., M.Kom
Cyber Security Engineering Study Program Sekolah Tinggi Sandi Negara Bogor, Indonesia
Muhamad Arie Taufik Rido Ganatuloh, S.Tr.TP.
Cryptography Engineering Study Program Sekolah Tinggi Sandi Negara Bogor, Indonesia








Abstract

Port knocking is a technique for adding an additional layer of access control before accessing certain ports on a computer. Unfortunately in the standard port knocking protocol, the knock sequence can be eavesdropped by anyone, and retransmitted/replayed. The replay of knock sequence by an adversary will omit the access control provided by port knocking protocol. In this research, we implement OTP S/Key protocol, combined with Diffie Hellman Key Exchange (DHKE), to supply a knock sequence that changes every time it is used, thus preventing knock sequence retransmission or also known as replay attacks. By comparing the intercepted port sequence of the standard port knocking protocol and the proposed protocol, it is concluded that OTP S/Key and DHKE can prevent replay attacks in port knocking.




Download Paper
PDF

Publication Date

27/11/2018


ISBN

978-602-53524-0-9


Copyright


© The authors.
This article is distributed under the terms of the Creative Commons Attribution License 4.0, which permits non-commercial use, distribution and reproduction in any medium, provided the original work is properly cited. See for details: https://creativecommons.org/licenses/by-nc/4.0/


RSS Feed
Feed

Download Paper

874 times.


Share




Proceeding The 2nd International Conference on Informatics for Development
27 November 2018
ISBN 978-602-53524-0-9
Open Access