Introduction to Information Security


Key Exchange with Symmetric Cryptography (cont)



Download 1,39 Mb.
bet38/44
Sana01.04.2022
Hajmi1,39 Mb.
#522548
1   ...   34   35   36   37   38   39   40   41   ...   44
Bog'liq
CSS

Key Exchange with Symmetric Cryptography (cont)

  • The key-exchange protocol:
  • A: => KDC (A,B);

    KDC: => A (E(KAB,KA), E(KAB,KB));

    A: => B (E(KAB,KB));

Key Exchange with Symmetric Cryptography (cont)

  • Issues:
    • Security depends on secrecy of KA and KB
      • KDC must be secure and trusted by both Alice and Bob
      • KA and KB should be used sparingly
    • The use of a new session key for each conversation limits the chances/value of compromising a session key

Attacking the Protocol

  • Alice and Bob set up a secure session protected by KAB
  • An intruder, Mallory, watches them do this and stores the KDC’s message to Alice and all the subsequent messages between Alice Bob encrypted with KAB
  • Mallory cryptanalyzes the session between Alice and Bob and eventually recovers KAB
  • The next time Alice and Bob want to talk Mallory intercepts the KDC’s reply and replays the old message containing KAB
  • Alice and Bob conduct a “secure” conversation which is protected by KAB which is known to Mallory

Attacking the Protocol (cont)

A: => KDC (A,B);

KDC: => A (E(KAB,KA), E(KAB,KB));

A: => B (E(KAB,KB));

// Alice and Bob encrypt their messages using KAB

// Mallory recovers KAB by analyzing Alice and Bob’s session

A: => KDC (A,B);

KDC: => A (E(KAB’,KA), E(KAB’,KB));

// Mallory intercepts the above message and replaces it

M: => A (E(KAB,KA), E(KAB,KB));

A: => B (E(KAB,KB));

// Mallory reads all traffic session between Alice and Bob

What Went Wrong?

  • Alice and Bob need to be able to distinguish between a current (or fresh) response from the KDC and an old one
  • Solutions:
    • Alice and Bob could keep track of all previously-used session keys and never accept an old session key
    • KDC could include freshness information in its messages
      • Timestamps
      • Nonces

Download 1,39 Mb.

Do'stlaringiz bilan baham:
1   ...   34   35   36   37   38   39   40   41   ...   44




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish