Security protocols: Difference between revisions

From miki
Jump to navigation Jump to search
(Needham-Schroeder-Lowe protocol)
 
Line 9: Line 9:
=== using public-key crypto - encrytion ===
=== using public-key crypto - encrytion ===


==== Needham-Schroeder-Lowe protocol ====
==== Needham-Schroeder-Lowe protocol (NSL) ====
References: [http://en.wikipedia.org/wiki/Needham–Schroeder_protocol], [http://cacr.uwaterloo.ca/hac/ hac, chap 12, §12.38]
References: [http://en.wikipedia.org/wiki/Needham–Schroeder_protocol], [http://cacr.uwaterloo.ca/hac/ hac, chap 12, §12.38]


* '''{{red|Don't confuse with}}''' the symmetric variant (used in Kerberos).
* '''{{red|Don't confuse with}}''' the symmetric variant (used in Kerberos).
* '''{{red|Orignal version broken}}''' — use Lowe variant (NSL protocol)
* '''{{red|Orignal version (NS protocol) broken}}''' — use this variant instead.


A --> B: P_B(k_1,A)
A --> B: P_B(k_1,A)
B <== A: P_A(k_1,k_2,B)
A <== B: P_A(k_1,k_2,B)
A --> B: P_B(k_2)
A --> B: P_B(k_2)



Revision as of 12:50, 5 May 2014

References

  • Handbook of applied cryptography
! this book is not always up-to-date ! Some protocols might be broken today (eg. Needham-Schroeder public-key protocol)

Authentication Protocol

using symmetric crypto

using public-key crypto - encrytion

Needham-Schroeder-Lowe protocol (NSL)

References: [1], hac, chap 12, §12.38

  • Don't confuse with the symmetric variant (used in Kerberos).
  • Orignal version (NS protocol) broken — use this variant instead.
A --> B: P_B(k_1,A)
A <== B: P_A(k_1,k_2,B)
A --> B: P_B(k_2)

using public-key crypto - signature