Security Protocols I - Information Security
Security Protocols I - Information Security
Security Protocols I - Information Security
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Sebastian Mödersheim 15Building a key establishment protocol (9)• In other words: the intruder has complete control of thechannel(s) over which protocol messages flow.The intruder has complete control over the network.• In contrast to ordinary communication protocols, we assume theworst-case of a malicious agent.◮ Although there may be no more than 4 or 5 messages involvedin a legitimate run of the protocol, there are an infinite numberof variations in which the intruder can participate.◮ These variations involve an unbounded number of messages andeach must satisfy the protocol’s security requirements.• The protocol can then be attacked as follows:FMSEC Module 2, v.2 28.09.2009