"MODERN CRYPTOGROPHY: THEORY AND PRACTICE" learning note on the second chapter of PART II

xiaoxiao2021-03-06  67

Below is an example of constant repeated ATTACK and FIX (Take a certified key establishment protocol protocols for automated key establishment using encryption)

Prot2.1: protocol "from alice to bob"

Alice Generates Kat, And Sends To Trent: Alice, Bob, {K} Kat; Trent Finds Keys Kat, KBT, Decrypts {K} Kat To Reveal K, Creates {K} KBT and Sends To Bob: Alice, Bob, {K} Kbt; Bob Decrypts {K} Kbt To Reveal K, Forms and sends to alice: {Hello Alice, I'm bob!} K.

Since K may not be safe enough, the K can could not obtain the trust of BOB, so changed to Trent to generate K

Prot2.2: protocol "session key from trent"

Alice Sends to Trent: Alice, Bob; Trent Finds Keys Kat, KBT, Generates K at Random and Sends To Alice: {K} Kat, {K} Kbt; Alice Decrypts {K} Kat, And Sends To Bob: Trent, Alice , {K} kbt; bob decrypts {k} KBT to Reveal K, Forms and sends to alice: {Hello, I'm bob!} K.

Attack2.2: an attack on prot2.2

Alice -> Malice ("Trent"): Alice, Bob;

Malice ("alice" -> Trent: Alice, Malice;

Trent Finds Kat, KMT, Generates Kam, -> Alice: {Kam} Kat, {Kam} KMT;

Alice decrypts {kam} kmt, -> malice ("bob"): trent, alice, {kam} kmt;

Malice ("Bob") -> Alice: {Hello, IM Bob!} Kam;

转载请注明原文地址:https://www.9cbs.com/read-120136.html

New Post(0)