Question: Consider the key exchange protocol here: A generates a random number R and sends to the server his name A, destination B, and E(Ka, R).
Consider the key exchange protocol here:
- A generates a random number R and sends to the server his name A, destination B, and E(Ka, R).
- Server responds by sending E(Kb, R) to A.
- A sends E(R, M) together with E(Kb, R) to B.
- B knows Kb, thus decrypts E(Kb, R), to get R and will subsequently use R to decrypt E(R, M) to get M.
In this scheme, Darth can capture the message in steps 1 and replay them later. How can Darth fool the server to get the value of R?
How can Darth then fool B by sending messages encrypted with R and pretending that Darth is actually A?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
