Corpus ID: 4685716

Analysis of the NTP Autokey Procedures

  title={Analysis of the NTP Autokey Procedures},
  author={S. R{\"o}ttger},

Figures from this paper

A Devil of a Time: How Vulnerable is NTP to Malicious Timeservers?
Our focus, in contrast to the above discussed directions, is on investigating and addressing NTP’s vulnerability to strategic attacks by malicious timeservers. The natural starting point for ourExpand
A Network Time Security Based Automatic Key Management for PTPv2.1
This paper proposes a simple and practical approach for the automated distribution of the necessary security parameters by using a key management system that enables the Immediate Security Processing in PTP. Expand
Analysis and Compensation of Latencies in NTS-secured NTP Time Synchronization
  • Martin Langer, Kai Heine, R. Bermbach, D. Sibold
  • Materials Science
  • 2020 Joint Conference of the IEEE International Frequency Control Symposium and International Symposium on Applications of Ferroelectrics (IFCS-ISAF)
  • 2020
Many time synchronization services use the Network Time Protocol (NTP), which resides in the upper OSI layers and is thus usually implemented in software. However, software-related runtimes reduceExpand
Performance Comparison Between Network Time Security Protocol Drafts: Improvements and Accuracy of the Latest NTS Draft
This paper compares the time synchronization performance of the standard Network Time Protocol (NTP) versus secured NTP using the Network Time Security (NTS) protocol and describes the improvementsExpand
Preventing (Network) Time Travel with Chronos
Chronos is presented, a new NTP client that achieves good synchronization even in the presence of powerful man-in-the-middle attackers and is carefully engineered to minimize communication overhead so as to avoid overloading NTP servers. Expand
Time synchronization performance using the network time security protocol
This paper compares the time synchronization performance of standard NTP versus NTP secured using the Network Time Security (NTS) protocol and conclusions are drawn regarding efficiency and potential improvements to the protocol. Expand
Efficient Secure Communication in VANETs under the Presence of new Requirements Emerging from Advanced Attacks
A set of extra requirements for realization of security systems for vehicular ad-hoc networks is determined and approaches for extending European and US systems being currently standardized are proposed and evaluated, which make such systems conform to the newly identified requirements. Expand
It's about Time: Securing Broadcast Time Synchronization with Data Origin Authentication
A comprehensive, theoretical evaluation of data origin authentication schemes from different application fields with regard to their applicability to secure broadcast time synchronization found some evaluated schemes were found to be susceptible to message delay attacks in the context of time synchronization. Expand
New security mechanisms for network time synchronization protocols
  • K. O'Donoghue, D. Sibold, S. Fries
  • Computer Science
  • 2017 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS)
  • 2017
An overview of the two solutions being developed, compares and contrasts those solutions, and discusses relevant use cases and deployment scenarios is provided. Expand
SecureTime: Secure Multicast Time Synchronization
This work identifies data origin authentication as the key security objective and suggests to employ recently proposed high-performance digital signature schemes (Ed25519 and MQQ-SIG) as foundation of a novel set of security measures to secure multicast time synchronization. Expand


Network Time Protocol Version 4: Autokey Specification
This memo describes the Autokey security model for authenticating servers to clients using the Network Time Protocol (NTP) and public key cryptography. Its design is based on the premise that IPSECExpand
How To Find Weak Input Differences For MD5 Collision Attacks
  • Tao Xie, D. Feng
  • Computer Science, Physics
  • IACR Cryptol. ePrint Arch.
  • 2009
A divide-and-conquer strategy is introduced with an optimal scheme of grouping the 64 steps of operation into five stages of independent condition fulfillment, and a feasible collision differential propagation is optimally characterized as a guide to select those 1-3-bit weak input differences, with their computational costs estimated. Expand
Network Time Protocol Version 4: Protocol and Algorithms Specification
NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (N TPv3), described in RFC 1305, as well as previous versions of the protocol, are described. Expand
Internet Key Exchange Protocol Version 2 (IKEv2)
chosenprefix collisions for md5 and the creation of a rogue ca certificate
  • In, Crypto 2009,
  • 2009
The Transport Layer Security (TLS) Protocol Version 1.2
This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements of the Transport Layer Security (TLS) protocol. Expand
Computer network time synchronization : the network time protocol on earth and in space
  • D. Mills
  • Computer Science, Engineering
  • 2006
This presentation explains in detail the design and implementation of the NTP interleaved modes, and some of the mechanisms used for transferring data between servers and reference clocks. Expand
Finding Collisions in the Full SHA-1
This is the first attack on the full 80-step SHA-1 with complexity less than the 280 theoretical bound, and it is shown that collisions ofSHA-1 can be found with complexityLess than 269 hash operations. Expand
IP Authentication Header
This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6. This document obsoletes RFC 2402 (NovemberExpand
IP Encapsulating Security Payload (ESP)