Question: The chart below shows an authentication protocol, followed by data exchange, followed by disconnection. Only an initial part of the authentication protocol is shown; here,

The chart below shows an authentication protocol, followed by data exchange, followed by disconnection. Only an initial part of the authentication protocol is shown; here, pw is A?s password, J is a key derived from pw, ?and L is a high-quality key. Assume an attacker that can (1) ?eavesdrop messages and (2) ?intercept and spoof messages sent by A (but not those sent by B). ?Complete the authentication protocol (i.e., ?Supply the part indicated by the ?** .... * *?) ?so that in spite of this attacker

? ?B authenticates A,

? ?this authentication is not vulnerable to off-line password guessing, and

? ?A and B establish a session key S (for encrypting data) ?such that after A and B disconnect and forget S, ?even if the attacker learns pw, ?the attacker cannot decrypt the data exchanged.\table[[,(has pw),(has J, ?L)],[,send [ ?conn ] ?to B,\table[[X encrypt(L) ?with],[key J],[send [ ?X ]]]],[,\table[[compute J from pw],[J' ?larr decrypt(X) ?with key]],],[**,,],[**,,],[**,,],[**,,],[**,,],[**,,],[**,,],[**,\table[[A and B exchange],[data ?

******* * A (has pw) send [ conn] to B compute J

******* * A (has pw) send [ conn] to B compute J from pw L' decrypt(X) with key J -A and B exchange data A and B disconnect B (has J, L) X encrypt(L) with key J send [X]

Step by Step Solution

3.39 Rating (158 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

To complete the authentication protocol and ensure security against the described attacker we can proceed as follows A sends a connection request to B ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!