11.07.2015 Views

Security Protocols I - Information Security

Security Protocols I - Information Security

Security Protocols I - Information Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Sebastian Mödersheim 38How the protocol is executed 1. A →B : {NA, A} pk(B)2. B→ A : {NA, NB} pk(A)3. A →B : {NB} pk(B)Role A:1. Generate nonce NA, concatenate it with name, and encrypt with pk(B).• Send {NA, A} pk(B) to B.2. Receive a message M.Q: how to do this when running multiple sessions (or protocols) in parallel?• Decrypt M it with inv(pk(A)), call it M ′ . If decryption fails, reject M.Q: how to detect wrong decryption?Q: what to do about rejected messages?• Split the message into two nonces NA ′ and NB. If that is not possible, reject M.Q: how to check this?• Check that NA ′ = NA; if not, reject M.3. Encrypt NB with pk(B) and send to B.FMSEC Module 2, v.2 28.09.2009

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!