11.07.2015 Views

Security Protocols I - Information Security

Security Protocols I - Information Security

Security Protocols I - Information Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Sebastian Mödersheim 20Building a key establishment protocol (14)• To overcome this attack, the names of the principals who are toshare K AB need to be bound cryptographically to the key.Neither of 2 previous attacks succeeds on the following protocol:S1. A, B2. {|K AB , B|} sk(A,S) , {|K AB , A|} sk(B,S) AB 3. {|K AB , A|} sk(B,S)• The protocol has improved to the point where an intruder isunable to attack it by eavesdropping or altering the messages sentbetween honest parties. However, even now the protocol is notgood enough to provide security on normal operating conditions.FMSEC Module 2, v.2 28.09.2009

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!