U4.4 Encryption Based Unilateral authentication protocol

Description

Masters Degree Network Security Mind Map on U4.4 Encryption Based Unilateral authentication protocol, created by Craig Parker on 07/12/2013.
Craig Parker
Mind Map by Craig Parker, updated more than 1 year ago
Craig Parker
Created by Craig Parker over 10 years ago
82
0

Resource summary

U4.4 Encryption Based Unilateral authentication protocol
  1. Alice messages Bob >Hi, its Alice
    1. A-->B "Hi Bob its Alice
    2. Bob responds with a random bit string as a challenge
      1. B --> A : R
        1. As its a random string it cant easily be predicted by an attacker
      2. Alice responds by sending an encryption of the challenge concatenated with Bobs ID using their shared key K
        1. A--> B: {R II B}K
          1. Bob decrypts the message and checks the plaintext contains his challenge
            1. Bob can be sure this message came from Alice because they share a secret key, because it includes Bob's identity he knows he didnt generate it humself
              1. This also means the message cant be a replay because it contains the challenge himself
            2. Random Challenges
              1. An attacker (M) even if he sees the challenge cant prepare a response cos he doesnt know the Key K
                1. If M could predict the challenge he could impersonate Bob issue the predicted challenge and get A's response (encrypted with key)
                  1. Later M impersonates Alice, when Bob issues the challenge M sends the one he got from A to Bob
                    1. Replaying messages later = replay attack
              2. As soon as this protocol is complete it could be hijacked
                1. Therefore only providing a guarantee at time of authentication
                Show full summary Hide full summary

                Similar

                CCNA Security 210-260 IINS - Exam 1
                Mike M
                CCNA Security 210-260 IINS - Exam 2
                Mike M
                SY0-401 Part 1 (50 questions)
                desideri
                CCNA Security 210-260 IINS - Exam 1
                Ricardo Nuñez
                CCNA Security 210-260 IINS - Exam 3
                irvin pastora
                1.3 Network and Security Components
                DJ Perrone
                U1. OSI 7 Layer Reference Model
                Craig Parker
                Types of Attacks
                River L.
                CCNA Security 210-260 IINS - Exam 1
                irvin pastora
                Network Security Vocabulary
                Shantal K Green
                CCNA Security 210-260 IINS - Exam 2
                irvin pastora