Security Protocols I - Information Security
Security Protocols I - Information Security
Security Protocols I - Information Security
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Sebastian Mödersheim 38How the protocol is executed 1. A →B : {NA, A} pk(B)2. B→ A : {NA, NB} pk(A)3. A →B : {NB} pk(B)Role A:1. Generate nonce NA, concatenate it with name, and encrypt with pk(B).• Send {NA, A} pk(B) to B.2. Receive a message M.Q: how to do this when running multiple sessions (or protocols) in parallel?• Decrypt M it with inv(pk(A)), call it M ′ . If decryption fails, reject M.Q: how to detect wrong decryption?Q: what to do about rejected messages?• Split the message into two nonces NA ′ and NB. If that is not possible, reject M.Q: how to check this?• Check that NA ′ = NA; if not, reject M.3. Encrypt NB with pk(B) and send to B.FMSEC Module 2, v.2 28.09.2009