Security protocols

From miki
Revision as of 17:50, 30 April 2014 by Mip (talk | contribs) (Needham-Schroeder-Lowe protocol)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

References

  • Handbook of applied cryptography
! this book is not always up-to-date ! Some protocols might be broken today (eg. Needham-Schroeder public-key protocol)

Authentication Protocol

using symmetric crypto

using public-key crypto - encrytion

Needham-Schroeder-Lowe protocol

References: [1], hac, chap 12, §12.38

  • Don't confuse with the symmetric variant (used in Kerberos).
  • Orignal version broken — use Lowe variant (NSL protocol)
A --> B: P_B(k_1,A)
B <== A: P_A(k_1,k_2,B)
A --> B: P_B(k_2)

using public-key crypto - signature