Professional Documents
Culture Documents
1. A B : { Na }K
2. B A : Na , { Nb }K
3. A B : Nb
Reflection Attack Example
1. A E(B) : { Na1 }K
1’. E(B) A : { Na1 }K
2’. A E(B) : Na1 , { Na2 }K
2. E(B) A : Na1 , { Na2 }K
• A E(B) : Na2
3’. E(B) A : Na2
Man-in-the-Middle
• In a Man-in-the-Middle attack the
attacker gets in the middle of a real run
of a protocol.
A B
Man-in-the-Middle
• In a Man-in-the-Middle attack the
attacker gets in the middle of a real run
of a protocol.
A B
E
Denial of Service (DoS)
• Every communication request uses an amount
of memory and CPU.
1. A S : A , Na
2. S A : EKa ( Na , Ns, Kas )
3. A S : { Ns }Kas
1. A S : Eks(A, S, SignA(Na,Kas) )
2. S A : { Na }Kas
1. A S : SYN
2. S A : ACK,SYN (add A to the table of connections)
3. A S : ACK ( ~ 3 min. time out )
1. A B : { NA }Kab
2. B A : { NA + 1, NB }Kab
3. A B : { NB + 1}Kab
4. B A : { Ks , N’ }Kab
Typing Attack Example
1. A B : { NA }Kab
2. B A : { NA + 1, NB }Kab
3. A B : { NB + 1}Kab
4. E(B) A : { NA + 1, NB }Kab
1. A S : A,B,NA
2. S A : {KAB,B,L,NA,{KAB,A,L}KBS }KAS
3. A B : {A,TA}KAB,{KAB,A,L}KBS
4. B A : {TA+1 }KAB
1. A S : A,B,NA
2. S A : {KAB,B,L,NA }KAS,{KAB,A,L}KBS
3. A B : {A,TA}KAB,{KAB,A,L}KBS
4. B A : {TA+1 }KAB
1. A B : EB( Na, A )
2. B A : EA( Na, Nb )
3. A B : EB( Nb )
1. A B : EB( Na, A )
2. B A : EA( Na, Nb )
3. A B : EB( Nb )
1. A B : EB( Na, A )
2. B A : EA( Na, Nb )
3. A B : EB( Nb )
1. A B : EB( Na, A )
2. B A : EA( Na, Nb , B)
3. A B : EB( Nb )
1. A B : EB( Na, A )
2. B A : EA( Na, Nb , B)
3. A B : EB( Nb )
1. AB:A
2. B A : Nb
1. A B : { Nb }Kas
2. B S : { A, { Nb }Kas}Kbs
3. S B : { Nb }Kbs
Example of Principle 3
1. E(A) B : A
1’. E B : E
2. B E(A) : Nba
2’. B E : Nbe
• E(A) B : { Nba }Kes
3’. E B : { Nba }Kes
• B S : { A, { Nba }Kes}Kbs
4’. B S : { E, { Nba }Kes}Kbs
5. S B : Fail
5’. S B : { Nba }Kbs
Example of Principle 3
1. E(A) B : A
1’. E B : E
2. B E(A) : Nba
2’. B E : Nbe
• E(A) B : { Nba }Kes
3’. E B : { Nba }Kes
• B S : { A, { Nba }Kes}Kbs
4’. B S : { E, { Nba }Kes}Kbs
5. S B : { Nba }Kbs
Principle 4
• Be clear about why encryption is being done.
A B : A, SignA( Ta,Na,B,Xa,EB(Ya) )
1. A B : A, B, Na
2. S A : { Na, B, Kab, {Kab, A}Kbs }Kas
3. A B : {Kab, A}Kbs
4. B A : { Nb }Kab
5. A B : { Nb + 1 }Kab
Forcing Reuse of an Old Key
• I spend 1 year breaking a single key
(Kab) on a super computer and then
trick everyone into using that key.
3. E B : {Kab, A}Kbs
4. B E : { Nb }Kab
5. E B : { Nb + 1 }Kab
Principle 10
• If an encoding is used to present the meaning
of a message, then it should be possible to
tell which encoding is being used.