11.07.2015 Views

Security Protocols I - Information Security

Security Protocols I - Information Security

Security Protocols I - Information Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Sebastian Mödersheim 15Building a key establishment protocol (9)• In other words: the intruder has complete control of thechannel(s) over which protocol messages flow.The intruder has complete control over the network.• In contrast to ordinary communication protocols, we assume theworst-case of a malicious agent.◮ Although there may be no more than 4 or 5 messages involvedin a legitimate run of the protocol, there are an infinite numberof variations in which the intruder can participate.◮ These variations involve an unbounded number of messages andeach must satisfy the protocol’s security requirements.• The protocol can then be attacked as follows:FMSEC Module 2, v.2 28.09.2009

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!