null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
423501
U4.4 Encryption Based Unilateral authentication protocol
Descripción
Masters Degree Network Security Mapa Mental sobre U4.4 Encryption Based Unilateral authentication protocol, creado por Craig Parker el 07/12/2013.
Sin etiquetas
network security
network security
masters degree
Mapa Mental por
Craig Parker
, actualizado hace más de 1 año
Más
Menos
Creado por
Craig Parker
hace más de 10 años
82
0
0
Resumen del Recurso
U4.4 Encryption Based Unilateral authentication protocol
Alice messages Bob >Hi, its Alice
A-->B "Hi Bob its Alice
Bob responds with a random bit string as a challenge
B --> A : R
As its a random string it cant easily be predicted by an attacker
Alice responds by sending an encryption of the challenge concatenated with Bobs ID using their shared key K
A--> B: {R II B}K
Bob decrypts the message and checks the plaintext contains his challenge
Bob can be sure this message came from Alice because they share a secret key, because it includes Bob's identity he knows he didnt generate it humself
This also means the message cant be a replay because it contains the challenge himself
Random Challenges
An attacker (M) even if he sees the challenge cant prepare a response cos he doesnt know the Key K
If M could predict the challenge he could impersonate Bob issue the predicted challenge and get A's response (encrypted with key)
Later M impersonates Alice, when Bob issues the challenge M sends the one he got from A to Bob
Replaying messages later = replay attack
As soon as this protocol is complete it could be hijacked
Therefore only providing a guarantee at time of authentication
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
CCNA Security 210-260 IINS - Exam 1
Mike M
CCNA Security 210-260 IINS - Exam 2
Mike M
SY0-401 Part 1 (50 questions)
desideri
CCNA Security 210-260 IINS - Exam 1
Ricardo Nuñez
CCNA Security 210-260 IINS - Exam 3
irvin pastora
1.3 Network and Security Components
DJ Perrone
U1. OSI 7 Layer Reference Model
Craig Parker
Types of Attacks
River L.
CCNA Security 210-260 IINS - Exam 1
irvin pastora
Network Security Vocabulary
Shantal K Green
CCNA Security 210-260 IINS - Exam 2
irvin pastora
Explorar la Librería