Question
10. Consider the following security protocol that authenticates two parties A and B, using a trusted server S. KA is a secret key known by
10. Consider the following security protocol that authenticates two parties A and B, using a trusted server S. KA is a secret key known by A and S, KB is the secret key known by B and S, N1 and N2 are nonces, generated by A and B, respectively. E[(M),K] denotes the encryption of message M with key K. || denotes concatenation of the message. Answer the following questions:
Message 1: A-> B: A || B || E[(A, B, N1), KA] Purpose of the message: What A knows and why: What B knows and why: What S knows and why:
Message 2: B -> S: A|| E[(A, B, N1), KA] || B || E[(A, B, N2), KB] Purpose of the message: What A knows and why: What B knows and why: What S knows and why:
Message 3: S -> B: E[(K-session, N2), KB] Purpose of the message: What A knows and why: What B knows and why: What S knows and why:
Message 4: S -> A: E[(K-session, N1), KA] Purpose of the message: What A knows and why: What B knows and why: What S knows and why:
Show how Mary may compromise the above protocol by blocking the first message from reaching Bob and replacing the 2nd message with the following new message 2. Complete the protocol. Message 1: A B: A || B || E[(A, B, N1), KA] ( Message 1 is Blocked by Mary, Bob never receives it.) New Message 2: M S: A|| E[(A, B, N1), KA] || M || E[(A, M, N2), KM] Message 3: Message 4:
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started