Security protocols: Difference between revisions
Jump to navigation
Jump to search
(Needham-Schroeder-Lowe protocol) |
|||
Line 9: | Line 9: | ||
=== using public-key crypto - encrytion === |
=== using public-key crypto - encrytion === |
||
==== Needham-Schroeder-Lowe protocol ==== |
==== Needham-Schroeder-Lowe protocol (NSL) ==== |
||
References: [http://en.wikipedia.org/wiki/Needham–Schroeder_protocol], [http://cacr.uwaterloo.ca/hac/ hac, chap 12, §12.38] |
References: [http://en.wikipedia.org/wiki/Needham–Schroeder_protocol], [http://cacr.uwaterloo.ca/hac/ hac, chap 12, §12.38] |
||
* '''{{red|Don't confuse with}}''' the symmetric variant (used in Kerberos). |
* '''{{red|Don't confuse with}}''' the symmetric variant (used in Kerberos). |
||
* '''{{red|Orignal version broken}}''' — use |
* '''{{red|Orignal version (NS protocol) broken}}''' — use this variant instead. |
||
A --> B: P_B(k_1,A) |
A --> B: P_B(k_1,A) |
||
A <== B: P_A(k_1,k_2,B) |
|||
A --> B: P_B(k_2) |
A --> B: P_B(k_2) |
||
Revision as of 12:50, 5 May 2014
References
- Handbook of applied cryptography
- ! this book is not always up-to-date ! Some protocols might be broken today (eg. Needham-Schroeder public-key protocol)
Authentication Protocol
using symmetric crypto
using public-key crypto - encrytion
Needham-Schroeder-Lowe protocol (NSL)
References: [1], hac, chap 12, §12.38
- Don't confuse with the symmetric variant (used in Kerberos).
- Orignal version (NS protocol) broken — use this variant instead.
A --> B: P_B(k_1,A) A <== B: P_A(k_1,k_2,B) A --> B: P_B(k_2)