alexarcan

cs_protocols_seminary

Dec 21st, 2016
306
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.03 KB | None | 0 0
  1. var - prod by someone else
  2. fresh - prod by us
  3. Bob doesnt know Eve is evil
  4. Eve impersonates Alice and Bob
  5. ni#2 = nonce
  6. <fake sender Eve> Eve is intercepting the msg and resends it to a person
  7. Eve has to change the sender(packet header)
  8. -bob(whoever) starts convers with eve => eve will be able to impersonate him
  9. -eve uses bob as a "decryption machine"
  10. -session keys
  11.  
  12. EX2
  13. -someone can fake the msg and pretend it's from someone else
  14. -based on the content of the msg you don't know from who the packet is from
  15. Good rules of protocol design
  16. -every msg sh be clear, explicit about sender & receiver
  17. -msg sh have different formats in different formats (else we can take a msg and reuse it in another step)
  18.  
  19. Ex4
  20. -the purpose: key share (kir) -> A key exchange protocol, key btw i & r
  21. -hash fcts: have to be irevertible, 2 msg sh not have same hash, easy to compute; used to encr passw, sign(compute the hash, sign with the hash); hash -> good for authenticity; to prove that you know a secret
  22. -we dont need nr, we can remove all hashes
Add Comment
Please, Sign In to add comment